xref: /openbmc/qemu/block/ssh.c (revision e1fe50dc)
1 /*
2  * Secure Shell (ssh) backend for QEMU.
3  *
4  * Copyright (C) 2013 Red Hat Inc., Richard W.M. Jones <rjones@redhat.com>
5  *
6  * Permission is hereby granted, free of charge, to any person obtaining a copy
7  * of this software and associated documentation files (the "Software"), to deal
8  * in the Software without restriction, including without limitation the rights
9  * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10  * copies of the Software, and to permit persons to whom the Software is
11  * furnished to do so, subject to the following conditions:
12  *
13  * The above copyright notice and this permission notice shall be included in
14  * all copies or substantial portions of the Software.
15  *
16  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19  * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21  * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22  * THE SOFTWARE.
23  */
24 
25 #include <stdio.h>
26 #include <stdlib.h>
27 #include <stdarg.h>
28 
29 #include <libssh2.h>
30 #include <libssh2_sftp.h>
31 
32 #include "block/block_int.h"
33 #include "qemu/sockets.h"
34 #include "qemu/uri.h"
35 #include "qapi/qmp/qint.h"
36 
37 /* DEBUG_SSH=1 enables the DPRINTF (debugging printf) statements in
38  * this block driver code.
39  *
40  * TRACE_LIBSSH2=<bitmask> enables tracing in libssh2 itself.  Note
41  * that this requires that libssh2 was specially compiled with the
42  * `./configure --enable-debug' option, so most likely you will have
43  * to compile it yourself.  The meaning of <bitmask> is described
44  * here: http://www.libssh2.org/libssh2_trace.html
45  */
46 #define DEBUG_SSH     0
47 #define TRACE_LIBSSH2 0 /* or try: LIBSSH2_TRACE_SFTP */
48 
49 #define DPRINTF(fmt, ...)                           \
50     do {                                            \
51         if (DEBUG_SSH) {                            \
52             fprintf(stderr, "ssh: %-15s " fmt "\n", \
53                     __func__, ##__VA_ARGS__);       \
54         }                                           \
55     } while (0)
56 
57 typedef struct BDRVSSHState {
58     /* Coroutine. */
59     CoMutex lock;
60 
61     /* SSH connection. */
62     int sock;                         /* socket */
63     LIBSSH2_SESSION *session;         /* ssh session */
64     LIBSSH2_SFTP *sftp;               /* sftp session */
65     LIBSSH2_SFTP_HANDLE *sftp_handle; /* sftp remote file handle */
66 
67     /* See ssh_seek() function below. */
68     int64_t offset;
69     bool offset_op_read;
70 
71     /* File attributes at open.  We try to keep the .filesize field
72      * updated if it changes (eg by writing at the end of the file).
73      */
74     LIBSSH2_SFTP_ATTRIBUTES attrs;
75 
76     /* Used to warn if 'flush' is not supported. */
77     char *hostport;
78     bool unsafe_flush_warning;
79 } BDRVSSHState;
80 
81 static void ssh_state_init(BDRVSSHState *s)
82 {
83     memset(s, 0, sizeof *s);
84     s->sock = -1;
85     s->offset = -1;
86     qemu_co_mutex_init(&s->lock);
87 }
88 
89 static void ssh_state_free(BDRVSSHState *s)
90 {
91     g_free(s->hostport);
92     if (s->sftp_handle) {
93         libssh2_sftp_close(s->sftp_handle);
94     }
95     if (s->sftp) {
96         libssh2_sftp_shutdown(s->sftp);
97     }
98     if (s->session) {
99         libssh2_session_disconnect(s->session,
100                                    "from qemu ssh client: "
101                                    "user closed the connection");
102         libssh2_session_free(s->session);
103     }
104     if (s->sock >= 0) {
105         close(s->sock);
106     }
107 }
108 
109 /* Wrappers around error_report which make sure to dump as much
110  * information from libssh2 as possible.
111  */
112 static void
113 session_error_report(BDRVSSHState *s, const char *fs, ...)
114 {
115     va_list args;
116 
117     va_start(args, fs);
118     error_vprintf(fs, args);
119 
120     if ((s)->session) {
121         char *ssh_err;
122         int ssh_err_code;
123 
124         libssh2_session_last_error((s)->session, &ssh_err, NULL, 0);
125         /* This is not an errno.  See <libssh2.h>. */
126         ssh_err_code = libssh2_session_last_errno((s)->session);
127 
128         error_printf(": %s (libssh2 error code: %d)", ssh_err, ssh_err_code);
129     }
130 
131     va_end(args);
132     error_printf("\n");
133 }
134 
135 static void
136 sftp_error_report(BDRVSSHState *s, const char *fs, ...)
137 {
138     va_list args;
139 
140     va_start(args, fs);
141     error_vprintf(fs, args);
142 
143     if ((s)->sftp) {
144         char *ssh_err;
145         int ssh_err_code;
146         unsigned long sftp_err_code;
147 
148         libssh2_session_last_error((s)->session, &ssh_err, NULL, 0);
149         /* This is not an errno.  See <libssh2.h>. */
150         ssh_err_code = libssh2_session_last_errno((s)->session);
151         /* See <libssh2_sftp.h>. */
152         sftp_err_code = libssh2_sftp_last_error((s)->sftp);
153 
154         error_printf(": %s (libssh2 error code: %d, sftp error code: %lu)",
155                      ssh_err, ssh_err_code, sftp_err_code);
156     }
157 
158     va_end(args);
159     error_printf("\n");
160 }
161 
162 static int parse_uri(const char *filename, QDict *options, Error **errp)
163 {
164     URI *uri = NULL;
165     QueryParams *qp = NULL;
166     int i;
167 
168     uri = uri_parse(filename);
169     if (!uri) {
170         return -EINVAL;
171     }
172 
173     if (strcmp(uri->scheme, "ssh") != 0) {
174         error_setg(errp, "URI scheme must be 'ssh'");
175         goto err;
176     }
177 
178     if (!uri->server || strcmp(uri->server, "") == 0) {
179         error_setg(errp, "missing hostname in URI");
180         goto err;
181     }
182 
183     if (!uri->path || strcmp(uri->path, "") == 0) {
184         error_setg(errp, "missing remote path in URI");
185         goto err;
186     }
187 
188     qp = query_params_parse(uri->query);
189     if (!qp) {
190         error_setg(errp, "could not parse query parameters");
191         goto err;
192     }
193 
194     if(uri->user && strcmp(uri->user, "") != 0) {
195         qdict_put(options, "user", qstring_from_str(uri->user));
196     }
197 
198     qdict_put(options, "host", qstring_from_str(uri->server));
199 
200     if (uri->port) {
201         qdict_put(options, "port", qint_from_int(uri->port));
202     }
203 
204     qdict_put(options, "path", qstring_from_str(uri->path));
205 
206     /* Pick out any query parameters that we understand, and ignore
207      * the rest.
208      */
209     for (i = 0; i < qp->n; ++i) {
210         if (strcmp(qp->p[i].name, "host_key_check") == 0) {
211             qdict_put(options, "host_key_check",
212                       qstring_from_str(qp->p[i].value));
213         }
214     }
215 
216     query_params_free(qp);
217     uri_free(uri);
218     return 0;
219 
220  err:
221     if (qp) {
222       query_params_free(qp);
223     }
224     if (uri) {
225       uri_free(uri);
226     }
227     return -EINVAL;
228 }
229 
230 static void ssh_parse_filename(const char *filename, QDict *options,
231                                Error **errp)
232 {
233     if (qdict_haskey(options, "user") ||
234         qdict_haskey(options, "host") ||
235         qdict_haskey(options, "port") ||
236         qdict_haskey(options, "path") ||
237         qdict_haskey(options, "host_key_check")) {
238         error_setg(errp, "user, host, port, path, host_key_check cannot be used at the same time as a file option");
239         return;
240     }
241 
242     parse_uri(filename, options, errp);
243 }
244 
245 static int check_host_key_knownhosts(BDRVSSHState *s,
246                                      const char *host, int port)
247 {
248     const char *home;
249     char *knh_file = NULL;
250     LIBSSH2_KNOWNHOSTS *knh = NULL;
251     struct libssh2_knownhost *found;
252     int ret, r;
253     const char *hostkey;
254     size_t len;
255     int type;
256 
257     hostkey = libssh2_session_hostkey(s->session, &len, &type);
258     if (!hostkey) {
259         ret = -EINVAL;
260         session_error_report(s, "failed to read remote host key");
261         goto out;
262     }
263 
264     knh = libssh2_knownhost_init(s->session);
265     if (!knh) {
266         ret = -EINVAL;
267         session_error_report(s, "failed to initialize known hosts support");
268         goto out;
269     }
270 
271     home = getenv("HOME");
272     if (home) {
273         knh_file = g_strdup_printf("%s/.ssh/known_hosts", home);
274     } else {
275         knh_file = g_strdup_printf("/root/.ssh/known_hosts");
276     }
277 
278     /* Read all known hosts from OpenSSH-style known_hosts file. */
279     libssh2_knownhost_readfile(knh, knh_file, LIBSSH2_KNOWNHOST_FILE_OPENSSH);
280 
281     r = libssh2_knownhost_checkp(knh, host, port, hostkey, len,
282                                  LIBSSH2_KNOWNHOST_TYPE_PLAIN|
283                                  LIBSSH2_KNOWNHOST_KEYENC_RAW,
284                                  &found);
285     switch (r) {
286     case LIBSSH2_KNOWNHOST_CHECK_MATCH:
287         /* OK */
288         DPRINTF("host key OK: %s", found->key);
289         break;
290     case LIBSSH2_KNOWNHOST_CHECK_MISMATCH:
291         ret = -EINVAL;
292         session_error_report(s, "host key does not match the one in known_hosts (found key %s)",
293                              found->key);
294         goto out;
295     case LIBSSH2_KNOWNHOST_CHECK_NOTFOUND:
296         ret = -EINVAL;
297         session_error_report(s, "no host key was found in known_hosts");
298         goto out;
299     case LIBSSH2_KNOWNHOST_CHECK_FAILURE:
300         ret = -EINVAL;
301         session_error_report(s, "failure matching the host key with known_hosts");
302         goto out;
303     default:
304         ret = -EINVAL;
305         session_error_report(s, "unknown error matching the host key with known_hosts (%d)",
306                              r);
307         goto out;
308     }
309 
310     /* known_hosts checking successful. */
311     ret = 0;
312 
313  out:
314     if (knh != NULL) {
315         libssh2_knownhost_free(knh);
316     }
317     g_free(knh_file);
318     return ret;
319 }
320 
321 static unsigned hex2decimal(char ch)
322 {
323     if (ch >= '0' && ch <= '9') {
324         return (ch - '0');
325     } else if (ch >= 'a' && ch <= 'f') {
326         return 10 + (ch - 'a');
327     } else if (ch >= 'A' && ch <= 'F') {
328         return 10 + (ch - 'A');
329     }
330 
331     return -1;
332 }
333 
334 /* Compare the binary fingerprint (hash of host key) with the
335  * host_key_check parameter.
336  */
337 static int compare_fingerprint(const unsigned char *fingerprint, size_t len,
338                                const char *host_key_check)
339 {
340     unsigned c;
341 
342     while (len > 0) {
343         while (*host_key_check == ':')
344             host_key_check++;
345         if (!qemu_isxdigit(host_key_check[0]) ||
346             !qemu_isxdigit(host_key_check[1]))
347             return 1;
348         c = hex2decimal(host_key_check[0]) * 16 +
349             hex2decimal(host_key_check[1]);
350         if (c - *fingerprint != 0)
351             return c - *fingerprint;
352         fingerprint++;
353         len--;
354         host_key_check += 2;
355     }
356     return *host_key_check - '\0';
357 }
358 
359 static int
360 check_host_key_hash(BDRVSSHState *s, const char *hash,
361                     int hash_type, size_t fingerprint_len)
362 {
363     const char *fingerprint;
364 
365     fingerprint = libssh2_hostkey_hash(s->session, hash_type);
366     if (!fingerprint) {
367         session_error_report(s, "failed to read remote host key");
368         return -EINVAL;
369     }
370 
371     if(compare_fingerprint((unsigned char *) fingerprint, fingerprint_len,
372                            hash) != 0) {
373         error_report("remote host key does not match host_key_check '%s'",
374                      hash);
375         return -EPERM;
376     }
377 
378     return 0;
379 }
380 
381 static int check_host_key(BDRVSSHState *s, const char *host, int port,
382                           const char *host_key_check)
383 {
384     /* host_key_check=no */
385     if (strcmp(host_key_check, "no") == 0) {
386         return 0;
387     }
388 
389     /* host_key_check=md5:xx:yy:zz:... */
390     if (strlen(host_key_check) >= 4 &&
391         strncmp(host_key_check, "md5:", 4) == 0) {
392         return check_host_key_hash(s, &host_key_check[4],
393                                    LIBSSH2_HOSTKEY_HASH_MD5, 16);
394     }
395 
396     /* host_key_check=sha1:xx:yy:zz:... */
397     if (strlen(host_key_check) >= 5 &&
398         strncmp(host_key_check, "sha1:", 5) == 0) {
399         return check_host_key_hash(s, &host_key_check[5],
400                                    LIBSSH2_HOSTKEY_HASH_SHA1, 20);
401     }
402 
403     /* host_key_check=yes */
404     if (strcmp(host_key_check, "yes") == 0) {
405         return check_host_key_knownhosts(s, host, port);
406     }
407 
408     error_report("unknown host_key_check setting (%s)", host_key_check);
409     return -EINVAL;
410 }
411 
412 static int authenticate(BDRVSSHState *s, const char *user)
413 {
414     int r, ret;
415     const char *userauthlist;
416     LIBSSH2_AGENT *agent = NULL;
417     struct libssh2_agent_publickey *identity;
418     struct libssh2_agent_publickey *prev_identity = NULL;
419 
420     userauthlist = libssh2_userauth_list(s->session, user, strlen(user));
421     if (strstr(userauthlist, "publickey") == NULL) {
422         ret = -EPERM;
423         error_report("remote server does not support \"publickey\" authentication");
424         goto out;
425     }
426 
427     /* Connect to ssh-agent and try each identity in turn. */
428     agent = libssh2_agent_init(s->session);
429     if (!agent) {
430         ret = -EINVAL;
431         session_error_report(s, "failed to initialize ssh-agent support");
432         goto out;
433     }
434     if (libssh2_agent_connect(agent)) {
435         ret = -ECONNREFUSED;
436         session_error_report(s, "failed to connect to ssh-agent");
437         goto out;
438     }
439     if (libssh2_agent_list_identities(agent)) {
440         ret = -EINVAL;
441         session_error_report(s, "failed requesting identities from ssh-agent");
442         goto out;
443     }
444 
445     for(;;) {
446         r = libssh2_agent_get_identity(agent, &identity, prev_identity);
447         if (r == 1) {           /* end of list */
448             break;
449         }
450         if (r < 0) {
451             ret = -EINVAL;
452             session_error_report(s, "failed to obtain identity from ssh-agent");
453             goto out;
454         }
455         r = libssh2_agent_userauth(agent, user, identity);
456         if (r == 0) {
457             /* Authenticated! */
458             ret = 0;
459             goto out;
460         }
461         /* Failed to authenticate with this identity, try the next one. */
462         prev_identity = identity;
463     }
464 
465     ret = -EPERM;
466     error_report("failed to authenticate using publickey authentication "
467                  "and the identities held by your ssh-agent");
468 
469  out:
470     if (agent != NULL) {
471         /* Note: libssh2 implementation implicitly calls
472          * libssh2_agent_disconnect if necessary.
473          */
474         libssh2_agent_free(agent);
475     }
476 
477     return ret;
478 }
479 
480 static int connect_to_ssh(BDRVSSHState *s, QDict *options,
481                           int ssh_flags, int creat_mode)
482 {
483     int r, ret;
484     Error *err = NULL;
485     const char *host, *user, *path, *host_key_check;
486     int port;
487 
488     host = qdict_get_str(options, "host");
489 
490     if (qdict_haskey(options, "port")) {
491         port = qdict_get_int(options, "port");
492     } else {
493         port = 22;
494     }
495 
496     path = qdict_get_str(options, "path");
497 
498     if (qdict_haskey(options, "user")) {
499         user = qdict_get_str(options, "user");
500     } else {
501         user = g_get_user_name();
502         if (!user) {
503             ret = -errno;
504             goto err;
505         }
506     }
507 
508     if (qdict_haskey(options, "host_key_check")) {
509         host_key_check = qdict_get_str(options, "host_key_check");
510     } else {
511         host_key_check = "yes";
512     }
513 
514     /* Construct the host:port name for inet_connect. */
515     g_free(s->hostport);
516     s->hostport = g_strdup_printf("%s:%d", host, port);
517 
518     /* Open the socket and connect. */
519     s->sock = inet_connect(s->hostport, &err);
520     if (err != NULL) {
521         ret = -errno;
522         qerror_report_err(err);
523         error_free(err);
524         goto err;
525     }
526 
527     /* Create SSH session. */
528     s->session = libssh2_session_init();
529     if (!s->session) {
530         ret = -EINVAL;
531         session_error_report(s, "failed to initialize libssh2 session");
532         goto err;
533     }
534 
535 #if TRACE_LIBSSH2 != 0
536     libssh2_trace(s->session, TRACE_LIBSSH2);
537 #endif
538 
539     r = libssh2_session_handshake(s->session, s->sock);
540     if (r != 0) {
541         ret = -EINVAL;
542         session_error_report(s, "failed to establish SSH session");
543         goto err;
544     }
545 
546     /* Check the remote host's key against known_hosts. */
547     ret = check_host_key(s, host, port, host_key_check);
548     if (ret < 0) {
549         goto err;
550     }
551 
552     /* Authenticate. */
553     ret = authenticate(s, user);
554     if (ret < 0) {
555         goto err;
556     }
557 
558     /* Start SFTP. */
559     s->sftp = libssh2_sftp_init(s->session);
560     if (!s->sftp) {
561         session_error_report(s, "failed to initialize sftp handle");
562         ret = -EINVAL;
563         goto err;
564     }
565 
566     /* Open the remote file. */
567     DPRINTF("opening file %s flags=0x%x creat_mode=0%o",
568             path, ssh_flags, creat_mode);
569     s->sftp_handle = libssh2_sftp_open(s->sftp, path, ssh_flags, creat_mode);
570     if (!s->sftp_handle) {
571         session_error_report(s, "failed to open remote file '%s'", path);
572         ret = -EINVAL;
573         goto err;
574     }
575 
576     r = libssh2_sftp_fstat(s->sftp_handle, &s->attrs);
577     if (r < 0) {
578         sftp_error_report(s, "failed to read file attributes");
579         return -EINVAL;
580     }
581 
582     /* Delete the options we've used; any not deleted will cause the
583      * block layer to give an error about unused options.
584      */
585     qdict_del(options, "host");
586     qdict_del(options, "port");
587     qdict_del(options, "user");
588     qdict_del(options, "path");
589     qdict_del(options, "host_key_check");
590 
591     return 0;
592 
593  err:
594     if (s->sftp_handle) {
595         libssh2_sftp_close(s->sftp_handle);
596     }
597     s->sftp_handle = NULL;
598     if (s->sftp) {
599         libssh2_sftp_shutdown(s->sftp);
600     }
601     s->sftp = NULL;
602     if (s->session) {
603         libssh2_session_disconnect(s->session,
604                                    "from qemu ssh client: "
605                                    "error opening connection");
606         libssh2_session_free(s->session);
607     }
608     s->session = NULL;
609 
610     return ret;
611 }
612 
613 static int ssh_file_open(BlockDriverState *bs, const char *filename,
614                          QDict *options, int bdrv_flags)
615 {
616     BDRVSSHState *s = bs->opaque;
617     int ret;
618     int ssh_flags;
619 
620     ssh_state_init(s);
621 
622     ssh_flags = LIBSSH2_FXF_READ;
623     if (bdrv_flags & BDRV_O_RDWR) {
624         ssh_flags |= LIBSSH2_FXF_WRITE;
625     }
626 
627     /* Start up SSH. */
628     ret = connect_to_ssh(s, options, ssh_flags, 0);
629     if (ret < 0) {
630         goto err;
631     }
632 
633     /* Go non-blocking. */
634     libssh2_session_set_blocking(s->session, 0);
635 
636     return 0;
637 
638  err:
639     if (s->sock >= 0) {
640         close(s->sock);
641     }
642     s->sock = -1;
643 
644     return ret;
645 }
646 
647 static QEMUOptionParameter ssh_create_options[] = {
648     {
649         .name = BLOCK_OPT_SIZE,
650         .type = OPT_SIZE,
651         .help = "Virtual disk size"
652     },
653     { NULL }
654 };
655 
656 static int ssh_create(const char *filename, QEMUOptionParameter *options)
657 {
658     int r, ret;
659     Error *local_err = NULL;
660     int64_t total_size = 0;
661     QDict *uri_options = NULL;
662     BDRVSSHState s;
663     ssize_t r2;
664     char c[1] = { '\0' };
665 
666     ssh_state_init(&s);
667 
668     /* Get desired file size. */
669     while (options && options->name) {
670         if (!strcmp(options->name, BLOCK_OPT_SIZE)) {
671             total_size = options->value.n;
672         }
673         options++;
674     }
675     DPRINTF("total_size=%" PRIi64, total_size);
676 
677     uri_options = qdict_new();
678     r = parse_uri(filename, uri_options, &local_err);
679     if (r < 0) {
680         qerror_report_err(local_err);
681         error_free(local_err);
682         ret = r;
683         goto out;
684     }
685 
686     r = connect_to_ssh(&s, uri_options,
687                        LIBSSH2_FXF_READ|LIBSSH2_FXF_WRITE|
688                        LIBSSH2_FXF_CREAT|LIBSSH2_FXF_TRUNC, 0644);
689     if (r < 0) {
690         ret = r;
691         goto out;
692     }
693 
694     if (total_size > 0) {
695         libssh2_sftp_seek64(s.sftp_handle, total_size-1);
696         r2 = libssh2_sftp_write(s.sftp_handle, c, 1);
697         if (r2 < 0) {
698             sftp_error_report(&s, "truncate failed");
699             ret = -EINVAL;
700             goto out;
701         }
702         s.attrs.filesize = total_size;
703     }
704 
705     ret = 0;
706 
707  out:
708     ssh_state_free(&s);
709     if (uri_options != NULL) {
710         QDECREF(uri_options);
711     }
712     return ret;
713 }
714 
715 static void ssh_close(BlockDriverState *bs)
716 {
717     BDRVSSHState *s = bs->opaque;
718 
719     ssh_state_free(s);
720 }
721 
722 static void restart_coroutine(void *opaque)
723 {
724     Coroutine *co = opaque;
725 
726     DPRINTF("co=%p", co);
727 
728     qemu_coroutine_enter(co, NULL);
729 }
730 
731 /* Always true because when we have called set_fd_handler there is
732  * always a request being processed.
733  */
734 static int return_true(void *opaque)
735 {
736     return 1;
737 }
738 
739 static coroutine_fn void set_fd_handler(BDRVSSHState *s)
740 {
741     int r;
742     IOHandler *rd_handler = NULL, *wr_handler = NULL;
743     Coroutine *co = qemu_coroutine_self();
744 
745     r = libssh2_session_block_directions(s->session);
746 
747     if (r & LIBSSH2_SESSION_BLOCK_INBOUND) {
748         rd_handler = restart_coroutine;
749     }
750     if (r & LIBSSH2_SESSION_BLOCK_OUTBOUND) {
751         wr_handler = restart_coroutine;
752     }
753 
754     DPRINTF("s->sock=%d rd_handler=%p wr_handler=%p", s->sock,
755             rd_handler, wr_handler);
756 
757     qemu_aio_set_fd_handler(s->sock, rd_handler, wr_handler, return_true, co);
758 }
759 
760 static coroutine_fn void clear_fd_handler(BDRVSSHState *s)
761 {
762     DPRINTF("s->sock=%d", s->sock);
763     qemu_aio_set_fd_handler(s->sock, NULL, NULL, NULL, NULL);
764 }
765 
766 /* A non-blocking call returned EAGAIN, so yield, ensuring the
767  * handlers are set up so that we'll be rescheduled when there is an
768  * interesting event on the socket.
769  */
770 static coroutine_fn void co_yield(BDRVSSHState *s)
771 {
772     set_fd_handler(s);
773     qemu_coroutine_yield();
774     clear_fd_handler(s);
775 }
776 
777 /* SFTP has a function `libssh2_sftp_seek64' which seeks to a position
778  * in the remote file.  Notice that it just updates a field in the
779  * sftp_handle structure, so there is no network traffic and it cannot
780  * fail.
781  *
782  * However, `libssh2_sftp_seek64' does have a catastrophic effect on
783  * performance since it causes the handle to throw away all in-flight
784  * reads and buffered readahead data.  Therefore this function tries
785  * to be intelligent about when to call the underlying libssh2 function.
786  */
787 #define SSH_SEEK_WRITE 0
788 #define SSH_SEEK_READ  1
789 #define SSH_SEEK_FORCE 2
790 
791 static void ssh_seek(BDRVSSHState *s, int64_t offset, int flags)
792 {
793     bool op_read = (flags & SSH_SEEK_READ) != 0;
794     bool force = (flags & SSH_SEEK_FORCE) != 0;
795 
796     if (force || op_read != s->offset_op_read || offset != s->offset) {
797         DPRINTF("seeking to offset=%" PRIi64, offset);
798         libssh2_sftp_seek64(s->sftp_handle, offset);
799         s->offset = offset;
800         s->offset_op_read = op_read;
801     }
802 }
803 
804 static coroutine_fn int ssh_read(BDRVSSHState *s,
805                                  int64_t offset, size_t size,
806                                  QEMUIOVector *qiov)
807 {
808     ssize_t r;
809     size_t got;
810     char *buf, *end_of_vec;
811     struct iovec *i;
812 
813     DPRINTF("offset=%" PRIi64 " size=%zu", offset, size);
814 
815     ssh_seek(s, offset, SSH_SEEK_READ);
816 
817     /* This keeps track of the current iovec element ('i'), where we
818      * will write to next ('buf'), and the end of the current iovec
819      * ('end_of_vec').
820      */
821     i = &qiov->iov[0];
822     buf = i->iov_base;
823     end_of_vec = i->iov_base + i->iov_len;
824 
825     /* libssh2 has a hard-coded limit of 2000 bytes per request,
826      * although it will also do readahead behind our backs.  Therefore
827      * we may have to do repeated reads here until we have read 'size'
828      * bytes.
829      */
830     for (got = 0; got < size; ) {
831     again:
832         DPRINTF("sftp_read buf=%p size=%zu", buf, end_of_vec - buf);
833         r = libssh2_sftp_read(s->sftp_handle, buf, end_of_vec - buf);
834         DPRINTF("sftp_read returned %zd", r);
835 
836         if (r == LIBSSH2_ERROR_EAGAIN || r == LIBSSH2_ERROR_TIMEOUT) {
837             co_yield(s);
838             goto again;
839         }
840         if (r < 0) {
841             sftp_error_report(s, "read failed");
842             s->offset = -1;
843             return -EIO;
844         }
845         if (r == 0) {
846             /* EOF: Short read so pad the buffer with zeroes and return it. */
847             qemu_iovec_memset(qiov, got, 0, size - got);
848             return 0;
849         }
850 
851         got += r;
852         buf += r;
853         s->offset += r;
854         if (buf >= end_of_vec && got < size) {
855             i++;
856             buf = i->iov_base;
857             end_of_vec = i->iov_base + i->iov_len;
858         }
859     }
860 
861     return 0;
862 }
863 
864 static coroutine_fn int ssh_co_readv(BlockDriverState *bs,
865                                      int64_t sector_num,
866                                      int nb_sectors, QEMUIOVector *qiov)
867 {
868     BDRVSSHState *s = bs->opaque;
869     int ret;
870 
871     qemu_co_mutex_lock(&s->lock);
872     ret = ssh_read(s, sector_num * BDRV_SECTOR_SIZE,
873                    nb_sectors * BDRV_SECTOR_SIZE, qiov);
874     qemu_co_mutex_unlock(&s->lock);
875 
876     return ret;
877 }
878 
879 static int ssh_write(BDRVSSHState *s,
880                      int64_t offset, size_t size,
881                      QEMUIOVector *qiov)
882 {
883     ssize_t r;
884     size_t written;
885     char *buf, *end_of_vec;
886     struct iovec *i;
887 
888     DPRINTF("offset=%" PRIi64 " size=%zu", offset, size);
889 
890     ssh_seek(s, offset, SSH_SEEK_WRITE);
891 
892     /* This keeps track of the current iovec element ('i'), where we
893      * will read from next ('buf'), and the end of the current iovec
894      * ('end_of_vec').
895      */
896     i = &qiov->iov[0];
897     buf = i->iov_base;
898     end_of_vec = i->iov_base + i->iov_len;
899 
900     for (written = 0; written < size; ) {
901     again:
902         DPRINTF("sftp_write buf=%p size=%zu", buf, end_of_vec - buf);
903         r = libssh2_sftp_write(s->sftp_handle, buf, end_of_vec - buf);
904         DPRINTF("sftp_write returned %zd", r);
905 
906         if (r == LIBSSH2_ERROR_EAGAIN || r == LIBSSH2_ERROR_TIMEOUT) {
907             co_yield(s);
908             goto again;
909         }
910         if (r < 0) {
911             sftp_error_report(s, "write failed");
912             s->offset = -1;
913             return -EIO;
914         }
915         /* The libssh2 API is very unclear about this.  A comment in
916          * the code says "nothing was acked, and no EAGAIN was
917          * received!" which apparently means that no data got sent
918          * out, and the underlying channel didn't return any EAGAIN
919          * indication.  I think this is a bug in either libssh2 or
920          * OpenSSH (server-side).  In any case, forcing a seek (to
921          * discard libssh2 internal buffers), and then trying again
922          * works for me.
923          */
924         if (r == 0) {
925             ssh_seek(s, offset + written, SSH_SEEK_WRITE|SSH_SEEK_FORCE);
926             co_yield(s);
927             goto again;
928         }
929 
930         written += r;
931         buf += r;
932         s->offset += r;
933         if (buf >= end_of_vec && written < size) {
934             i++;
935             buf = i->iov_base;
936             end_of_vec = i->iov_base + i->iov_len;
937         }
938 
939         if (offset + written > s->attrs.filesize)
940             s->attrs.filesize = offset + written;
941     }
942 
943     return 0;
944 }
945 
946 static coroutine_fn int ssh_co_writev(BlockDriverState *bs,
947                                       int64_t sector_num,
948                                       int nb_sectors, QEMUIOVector *qiov)
949 {
950     BDRVSSHState *s = bs->opaque;
951     int ret;
952 
953     qemu_co_mutex_lock(&s->lock);
954     ret = ssh_write(s, sector_num * BDRV_SECTOR_SIZE,
955                     nb_sectors * BDRV_SECTOR_SIZE, qiov);
956     qemu_co_mutex_unlock(&s->lock);
957 
958     return ret;
959 }
960 
961 static void unsafe_flush_warning(BDRVSSHState *s, const char *what)
962 {
963     if (!s->unsafe_flush_warning) {
964         error_report("warning: ssh server %s does not support fsync",
965                      s->hostport);
966         if (what) {
967             error_report("to support fsync, you need %s", what);
968         }
969         s->unsafe_flush_warning = true;
970     }
971 }
972 
973 #ifdef HAS_LIBSSH2_SFTP_FSYNC
974 
975 static coroutine_fn int ssh_flush(BDRVSSHState *s)
976 {
977     int r;
978 
979     DPRINTF("fsync");
980  again:
981     r = libssh2_sftp_fsync(s->sftp_handle);
982     if (r == LIBSSH2_ERROR_EAGAIN || r == LIBSSH2_ERROR_TIMEOUT) {
983         co_yield(s);
984         goto again;
985     }
986     if (r == LIBSSH2_ERROR_SFTP_PROTOCOL &&
987         libssh2_sftp_last_error(s->sftp) == LIBSSH2_FX_OP_UNSUPPORTED) {
988         unsafe_flush_warning(s, "OpenSSH >= 6.3");
989         return 0;
990     }
991     if (r < 0) {
992         sftp_error_report(s, "fsync failed");
993         return -EIO;
994     }
995 
996     return 0;
997 }
998 
999 static coroutine_fn int ssh_co_flush(BlockDriverState *bs)
1000 {
1001     BDRVSSHState *s = bs->opaque;
1002     int ret;
1003 
1004     qemu_co_mutex_lock(&s->lock);
1005     ret = ssh_flush(s);
1006     qemu_co_mutex_unlock(&s->lock);
1007 
1008     return ret;
1009 }
1010 
1011 #else /* !HAS_LIBSSH2_SFTP_FSYNC */
1012 
1013 static coroutine_fn int ssh_co_flush(BlockDriverState *bs)
1014 {
1015     BDRVSSHState *s = bs->opaque;
1016 
1017     unsafe_flush_warning(s, "libssh2 >= 1.4.4");
1018     return 0;
1019 }
1020 
1021 #endif /* !HAS_LIBSSH2_SFTP_FSYNC */
1022 
1023 static int64_t ssh_getlength(BlockDriverState *bs)
1024 {
1025     BDRVSSHState *s = bs->opaque;
1026     int64_t length;
1027 
1028     /* Note we cannot make a libssh2 call here. */
1029     length = (int64_t) s->attrs.filesize;
1030     DPRINTF("length=%" PRIi64, length);
1031 
1032     return length;
1033 }
1034 
1035 static BlockDriver bdrv_ssh = {
1036     .format_name                  = "ssh",
1037     .protocol_name                = "ssh",
1038     .instance_size                = sizeof(BDRVSSHState),
1039     .bdrv_parse_filename          = ssh_parse_filename,
1040     .bdrv_file_open               = ssh_file_open,
1041     .bdrv_create                  = ssh_create,
1042     .bdrv_close                   = ssh_close,
1043     .bdrv_co_readv                = ssh_co_readv,
1044     .bdrv_co_writev               = ssh_co_writev,
1045     .bdrv_getlength               = ssh_getlength,
1046     .bdrv_co_flush_to_disk        = ssh_co_flush,
1047     .create_options               = ssh_create_options,
1048 };
1049 
1050 static void bdrv_ssh_init(void)
1051 {
1052     int r;
1053 
1054     r = libssh2_init(0);
1055     if (r != 0) {
1056         fprintf(stderr, "libssh2 initialization failed, %d\n", r);
1057         exit(EXIT_FAILURE);
1058     }
1059 
1060     bdrv_register(&bdrv_ssh);
1061 }
1062 
1063 block_init(bdrv_ssh_init);
1064