Add external interface messages

This commit is contained in:
Mario Limonciello 2020-10-26 10:00:14 -05:00 committed by Mario Limonciello
parent 2409b302a6
commit 8aa5d41eb7
62 changed files with 258 additions and 1 deletions

View File

@ -6,3 +6,7 @@ Introduction
This plugin checks if DMA remapping for Thunderbolt devices is available. The This plugin checks if DMA remapping for Thunderbolt devices is available. The
result will be stored in an security attribute for HSI. result will be stored in an security attribute for HSI.
External interface access
-------------------------
This plugin requires read access to `/sys/firmware/acpi/tables`.

View File

@ -6,3 +6,7 @@ Introduction
This plugin checks if S2I sleep is available. The result will be stored in an This plugin checks if S2I sleep is available. The result will be stored in an
security attribute for HSI. security attribute for HSI.
External interface access
-------------------------
This plugin requires read access to `/sys/firmware/acpi/tables`.

View File

@ -67,3 +67,7 @@ Command: `W $addr\n` where `$addr` is a memory address `0x8001000->0x8008000`
Command: `v\n` Command: `v\n`
The device will reboot into application mode. This is typically performed after The device will reboot into application mode. This is typically performed after
flashing firmware completes successfully. flashing firmware completes successfully.
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -25,3 +25,7 @@ Vendor ID Security
------------------ ------------------
The device is not upgradable and thus requires no vendor ID set. The device is not upgradable and thus requires no vendor ID set.
External interface access
-------------------------
This plugin requires read only access to `/dev/mei0`.

View File

@ -47,3 +47,7 @@ This plugin uses the following plugin-specific quirks:
|------------------------|-------------------------------------------|-----------------------| |------------------------|-------------------------------------------|-----------------------|
| `AtaTransferBlocks` | Blocks to transfer, or `0xffff` for max | 1.2.4 | | `AtaTransferBlocks` | Blocks to transfer, or `0xffff` for max | 1.2.4 |
| `AtaTransferMode` | The transfer mode, `0x3`, `0x7` or `0xe` | 1.2.4 | | `AtaTransferMode` | The transfer mode, `0x3`, `0x7` or `0xe` | 1.2.4 |
External interface access
-------------------------
This plugin requires the `SG_IO` ioctl interface.

View File

@ -26,3 +26,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the PCI vendor, in this instance set to `PCI:0x14E4` The vendor ID is set from the PCI vendor, in this instance set to `PCI:0x14E4`
External interface access
-------------------------
This plugin requires the `SIOCETHTOOL` ioctl interface.

View File

@ -97,3 +97,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the USB vendor, for example set to `USB:0x04B4` The vendor ID is set from the USB vendor, for example set to `USB:0x04B4`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -34,3 +34,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the USB vendor, in this instance set to `USB:0x273F` The vendor ID is set from the USB vendor, in this instance set to `USB:0x273F`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -57,3 +57,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the BIOS vendor, in this instance `DMI:coreboot` The vendor ID is set from the BIOS vendor, in this instance `DMI:coreboot`
External interface access
-------------------------
This plugin does not currently use any external access.

View File

@ -16,3 +16,7 @@ These devices add extra instance IDs from the CPUID values, e.g.
* `CPUID\PRO_0&FAM_06` * `CPUID\PRO_0&FAM_06`
* `CPUID\PRO_0&FAM_06&MOD_0E` * `CPUID\PRO_0&FAM_06&MOD_0E`
* `CPUID\PRO_0&FAM_06&MOD_0E&STP_3` * `CPUID\PRO_0&FAM_06&MOD_0E&STP_3`
External interface access
-------------------------
This plugin requires no extra access.

View File

@ -38,6 +38,10 @@ values depending on the model and device mode. The list of USB VIDs used is:
* `USB:0x18D1` * `USB:0x18D1`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.
[1] https://chromium.googlesource.com/chromiumos/platform/ec/+/master/extra/usb_updater/usb_updater2.c [1] https://chromium.googlesource.com/chromiumos/platform/ec/+/master/extra/usb_updater/usb_updater2.c
[2] https://chromium.googlesource.com/chromiumos/platform/ec/+/master/docs/usb_updater.md [2] https://chromium.googlesource.com/chromiumos/platform/ec/+/master/docs/usb_updater.md
[3] https://www.chromium.org/chromium-os/firmware-porting-guide/fmap [3] https://www.chromium.org/chromium-os/firmware-porting-guide/fmap

View File

@ -39,3 +39,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the USB vendor, in this instance set to `USB:0x0A12` The vendor ID is set from the USB vendor, in this instance set to `USB:0x0A12`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -68,3 +68,7 @@ This plugin uses the following plugin-specific quirks:
| `DellDockVersionLowest` | The minimum component version required to safely operate the plugin | 1.1.3 | | `DellDockVersionLowest` | The minimum component version required to safely operate the plugin | 1.1.3 |
| `DellDockBoard*` | The board description of a board revision | 1.1.3 | | `DellDockBoard*` | The board description of a board revision | 1.1.3 |
| `DellDockInstallDurationI2C` | The duration of time required to install a payload via I2C. | 1.1.3 | | `DellDockInstallDurationI2C` | The duration of time required to install a payload via I2C. | 1.1.3 |
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -45,3 +45,9 @@ UEFI dummy device
Version: 0 Version: 0
Created: 2018-06-25 Created: 2018-06-25
``` ```
External interface access
-------------------------
This plugin requires:
* read/write access to `/dev/wmi/dell-smbios` and `/sys/bus/platform/devices/dcdbas`.
* read access to `/sys/firmware/efi/esrt`.

View File

@ -181,3 +181,7 @@ These updates can be performed the standard method of using:
Some components are updatable via other plugins in fwupd such as multi stream Some components are updatable via other plugins in fwupd such as multi stream
transport hub (MST) and thunderbolt NVM. transport hub (MST) and thunderbolt NVM.
External interface access
-------------------------
This plugin requires read/write access to `/dev/wmi/dell-smbios` and `/sys/bus/platform/devices/dcdbas`.

View File

@ -41,3 +41,7 @@ This plugin uses the following plugin-specific quirks:
|`DfuFlags` | Optional quirks for a DFU device which doesn't follow the DFU 1.0 or 1.1 specification | 1.0.1| |`DfuFlags` | Optional quirks for a DFU device which doesn't follow the DFU 1.0 or 1.1 specification | 1.0.1|
|`DfuForceVersion` | Forces a specific DFU version for the hardware device. This is required if the device does not set, or sets incorrectly, items in the DFU functional descriptor. |1.0.1| |`DfuForceVersion` | Forces a specific DFU version for the hardware device. This is required if the device does not set, or sets incorrectly, items in the DFU functional descriptor. |1.0.1|
|`DfuForceTimeout` | Forces a specific device timeout, in ms | 1.4.0 | |`DfuForceTimeout` | Forces a specific device timeout, in ms | 1.4.0 |
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -44,3 +44,7 @@ values depending on the model and device mode. The list of USB VIDs used is:
* `USB:0x1235` * `USB:0x1235`
* `USB:0x2002` * `USB:0x2002`
* `USB:0x8000` * `USB:0x8000`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -31,7 +31,7 @@ Additionally another instance ID is added which corresponds to the module ID:
These devices also use custom GUID values for the IC configuration, e.g. These devices also use custom GUID values for the IC configuration, e.g.
* `ELANTP\ICTYPE_09` * `ELANTP\ICTYPE_09`
Additionally another instance ID is added which corresponds to the IC type & module ID: Additionally another instance ID is added which corresponds to the IC type & module ID:
* `ELANTP\ICTYPE_09&MOD_1234` * `ELANTP\ICTYPE_09&MOD_1234`
@ -50,3 +50,7 @@ This plugin uses the following plugin-specific quirks:
|------------------------|-------------------------------------------|-----------------------| |------------------------|-------------------------------------------|-----------------------|
| `ElantpIcPageCount` | The IC page count | 1.4.6 | | `ElantpIcPageCount` | The IC page count | 1.4.6 |
| `ElantpIapPassword` | The IAP password | 1.4.6 | | `ElantpIapPassword` | The IAP password | 1.4.6 |
External interface access
-------------------------
This plugin requires ioctl access to `HIDIOCSFEATURE` and `HIDIOCGFEATURE`.

View File

@ -24,3 +24,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the EMMC vendor, for example set to `EMMC:{$manfid}` The vendor ID is set from the EMMC vendor, for example set to `EMMC:{$manfid}`
External interface access
-------------------------
This plugin requires ioctl `MMC_IOC_CMD` and `MMC_IOC_MULTI_CMD` access.

View File

@ -29,3 +29,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the USB vendor, in this instance set to `USB:0x17EF` The vendor ID is set from the USB vendor, in this instance set to `USB:0x17EF`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -43,3 +43,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the USB vendor, for example `USB:0x18D1` The vendor ID is set from the USB vendor, for example `USB:0x18D1`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -28,3 +28,8 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the BIOS vendor, for example `DMI:Google` The vendor ID is set from the BIOS vendor, for example `DMI:Google`
External interface access
---
This plugin requires access to all interfaces that `libflashrom` has been compiled for.
This typically is `/sys/bus/spi` but there may be other interfaces as well.

View File

@ -33,3 +33,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the USB vendor, in this instance set to `USB:0x1D5C` The vendor ID is set from the USB vendor, in this instance set to `USB:0x1D5C`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -29,3 +29,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the USB vendor, in this instance set to `USB:0x27C6` The vendor ID is set from the USB vendor, in this instance set to `USB:0x27C6`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -5,3 +5,7 @@ Introduction
------------ ------------
This plugin checks if an IOMMU is available on the system. This plugin checks if an IOMMU is available on the system.
External interface access
-------------------------
This plugin requires no extra access.

View File

@ -26,3 +26,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the USB vendor, in this instance set to `USB:0x0A12` The vendor ID is set from the USB vendor, in this instance set to `USB:0x0A12`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -6,3 +6,7 @@ Introduction
This plugin checks if the currently running kernel is locked down. The result This plugin checks if the currently running kernel is locked down. The result
will be stored in an security attribute for HSI. will be stored in an security attribute for HSI.
External interface access
-------------------------
This plugin requires read access to `/sys/sys/kernel/security`.

View File

@ -6,3 +6,7 @@ Introduction
This plugin checks if s3 sleep is available. The result will be stored in an This plugin checks if s3 sleep is available. The result will be stored in an
security attribute for HSI. security attribute for HSI.
External interface access
-------------------------
This plugin requires read access to `/sys/power/mem_sleep`.

View File

@ -6,3 +6,7 @@ Introduction
This plugin checks if the currently available swap partitions and files are This plugin checks if the currently available swap partitions and files are
all encrypted. The result will be stored in an security attribute for HSI. all encrypted. The result will be stored in an security attribute for HSI.
External interface access
-------------------------
This plugin requires read access to `/proc`

View File

@ -6,3 +6,7 @@ Introduction
This plugin checks if the currently running kernel is tainted. The result will This plugin checks if the currently running kernel is tainted. The result will
be stored in an security attribute for HSI. be stored in an security attribute for HSI.
External interface access
-------------------------
This plugin requires read access to `/sys/kernel/tainted`.

View File

@ -11,3 +11,7 @@ Vendor ID Security
------------------ ------------------
This protocol does not create a device and thus requires no vendor ID set. This protocol does not create a device and thus requires no vendor ID set.
External interface access
-------------------------
This plugin requires access to the dbus interface `org.freedesktop.login1`.

View File

@ -58,3 +58,7 @@ paired devices.
[1] https://www.mousejack.com/ [1] https://www.mousejack.com/
[2] https://pwr-Solaar.github.io/Solaar/ [2] https://pwr-Solaar.github.io/Solaar/
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -48,3 +48,7 @@ partition where the MCFG files are stored can be wiped out before installing
the new ones. the new ones.
Update protocol: com.qualcomm.qmi_pdc Update protocol: com.qualcomm.qmi_pdc
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -12,3 +12,7 @@ always be disabled and locked on production hardware as it allows the
attacker to disable other firmware protection methods. attacker to disable other firmware protection methods.
The result will be stored in a security attribute for HSI. The result will be stored in a security attribute for HSI.
External interface access
-------------------------
This plugin requires read access to `/sys/class/msr`.

View File

@ -25,3 +25,7 @@ Vendor ID Security
The vendor ID is set from the USB vendor, in this instance set to `USB:0x20A0` The vendor ID is set from the USB vendor, in this instance set to `USB:0x20A0`
in runtime mode and `USB:0x03EB` in bootloader mode. in runtime mode and `USB:0x03EB` in bootloader mode.
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -54,3 +54,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the udev vendor, for example set to `NVME:0x1179` The vendor ID is set from the udev vendor, for example set to `NVME:0x1179`
External interface access
-------------------------
This plugin requires ioctl `NVME_IOCTL_ADMIN_CMD` access.

View File

@ -24,3 +24,7 @@ Vendor ID Security
------------------ ------------------
The device is not upgradable and thus requires no vendor ID set. The device is not upgradable and thus requires no vendor ID set.
External interface access
-------------------------
This plugin requires read access to the rom file of PCI devices (`/sys/class/pci_bus/*/device/rom`)

View File

@ -6,3 +6,7 @@ Introduction
This plugin checks if the system SPI chip is locked. The result will be stored This plugin checks if the system SPI chip is locked. The result will be stored
in an security attribute for HSI. in an security attribute for HSI.
External interface access
-------------------------
This plugin requires read access to the config space of PCI devices (`/sys/class/pci_bus/*/device/config`)

View File

@ -6,3 +6,7 @@ Introduction
This plugin checks if the ME is in Manufacturing Mode. The result will be stored This plugin checks if the ME is in Manufacturing Mode. The result will be stored
in an security attribute for HSI. in an security attribute for HSI.
External interface access
-------------------------
This plugin requires read access to the config space of PCI devices (`/sys/class/pci_bus/*/device/config`)

View File

@ -6,3 +6,7 @@ Introduction
This plugin checks if the system SPI chip is locked. The result will be stored This plugin checks if the system SPI chip is locked. The result will be stored
in an security attribute for HSI. in an security attribute for HSI.
External interface access
-------------------------
This plugin requires read access to `/sys/class/platform-integrity`

View File

@ -73,3 +73,7 @@ and verify the uri with
or or
$ curl -k https://192.168.0.133:443/redfish/v1/ $ curl -k https://192.168.0.133:443/redfish/v1/
External interface access
-------------------------
This requires HTTP access to a given URL.

View File

@ -47,3 +47,7 @@ This plugin uses the following plugin-specific quirks:
| `Rts54TargetAddr` | The target address of a child module. | 1.1.3 | | `Rts54TargetAddr` | The target address of a child module. | 1.1.3 |
| `Rts54I2cSpeed` | The I2C speed to operate at (0, 1, 2). | 1.1.3 | | `Rts54I2cSpeed` | The I2C speed to operate at (0, 1, 2). | 1.1.3 |
| `Rts54RegisterAddrLen` | The I2C register address length of commands | 1.1.3 | | `Rts54RegisterAddrLen` | The I2C register address length of commands | 1.1.3 |
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -33,3 +33,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the USB vendor, in this instance set to `USB:0x0BDA` The vendor ID is set from the USB vendor, in this instance set to `USB:0x0BDA`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -31,3 +31,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the USB vendor, in this instance set to `USB:0x0483` The vendor ID is set from the USB vendor, in this instance set to `USB:0x0483`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -21,3 +21,7 @@ Vendor ID Security
------------------ ------------------
The device is not upgradable and thus requires no vendor ID set. The device is not upgradable and thus requires no vendor ID set.
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -27,3 +27,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the baseboard vendor, for example `DMI:Star Labs` The vendor ID is set from the baseboard vendor, for example `DMI:Star Labs`
External interface access
-------------------------
This plugin requires access to raw system memory via `inb`/`outb`.

View File

@ -47,3 +47,7 @@ This plugin uses the following plugin-specific quirks:
| `IsSoftwareResetSupported` | If the chip supports self-reset | 1.3.2 | | `IsSoftwareResetSupported` | If the chip supports self-reset | 1.3.2 |
| `EepromPatchValidAddr` | Address of patch location #1 | 1.3.2 | | `EepromPatchValidAddr` | Address of patch location #1 | 1.3.2 |
| `EepromPatch2ValidAddr` | Address of patch location #2 | 1.3.2 | | `EepromPatch2ValidAddr` | Address of patch location #2 | 1.3.2 |
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -84,3 +84,7 @@ Here is a sample list of systems known to support them however:
* Latitude Rugged 5414 * Latitude Rugged 5414
* Latitude Rugged 7214 * Latitude Rugged 7214
* Latitude Rugged 7414 * Latitude Rugged 7414
External interface access
-------------------------
This plugin requires read/write access to `/dev/drm_dp_aux*`.

View File

@ -31,3 +31,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the USB vendor, in this instance set to `USB:0x06CB` The vendor ID is set from the USB vendor, in this instance set to `USB:0x06CB`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -31,3 +31,7 @@ a proprietary (but docucumented) file format.
This plugin supports the following protocol ID: This plugin supports the following protocol ID:
* com.synaptics.rmi * com.synaptics.rmi
External interface access
-------------------------
This plugin requires ioctl access to `HIDIOCSFEATURE` and `HIDIOCGFEATURE`.

View File

@ -16,3 +16,7 @@ Vendor ID Security
------------------ ------------------
The fake device is only for local testing and thus requires no vendor ID set. The fake device is only for local testing and thus requires no vendor ID set.
External interface access
-------------------------
This plugin requires no extra access.

View File

@ -20,3 +20,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the USB vendor, in this instance set to `USB:0x1209` The vendor ID is set from the USB vendor, in this instance set to `USB:0x1209`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -92,3 +92,7 @@ DROM and exposed in the relevant sysfs attributes.
If the controller is in native enumeration mode, the string "-native" is added If the controller is in native enumeration mode, the string "-native" is added
at the end so the format is "TBT-vvvvdddd-native". at the end so the format is "TBT-vvvvdddd-native".
External interface access
-------------------------
This plugin requires read/write access to `/sys/bus/thunderbolt`.

View File

@ -15,3 +15,7 @@ Vendor ID Security
------------------ ------------------
The device is not upgradable and thus requires no vendor ID set. The device is not upgradable and thus requires no vendor ID set.
External interface access
-------------------------
This plugin requires read only access to `/sys/kernel/security/tpm0/binary_bios_measurements`.

View File

@ -30,3 +30,7 @@ Vendor ID Security
------------------ ------------------
The device is not upgradable and thus requires no vendor ID set. The device is not upgradable and thus requires no vendor ID set.
External interface access
-------------------------
This plugin uses the tpm2-tss library to access the TPM. It requires access to `/sys/class/tpm`.

View File

@ -39,3 +39,9 @@ Vendor ID Security
------------------ ------------------
The vendor ID is hardcoded to `UEFI:Microsoft` for all devices. The vendor ID is hardcoded to `UEFI:Microsoft` for all devices.
External interface access
-------------------------
This plugin requires:
* read/write access to `/sys/firmware/efi/efivars`

View File

@ -20,3 +20,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the BIOS vendor, for example `DMI:LENOVO` The vendor ID is set from the BIOS vendor, for example `DMI:LENOVO`
External interface access
-------------------------
This plugin requires no extra access.

View File

@ -58,3 +58,11 @@ Since version 1.1.0 fwupd will autodetect the ESP when it is mounted on
used by modifying *OverrideESPMountPoint* in `/etc/fwupd/uefi.conf`. used by modifying *OverrideESPMountPoint* in `/etc/fwupd/uefi.conf`.
Setting an invalid directory will disable the fwupd plugin. Setting an invalid directory will disable the fwupd plugin.
External interface access
-------------------------
This plugin requires:
* read/write access to the EFI system partition.
* read access to `/sys/firmware/efi/esrt/`
* read access to `/sys/firmware/efi/fw_platform_size`
* read/write access to `/sys/firmware/efi/efivars`

View File

@ -10,3 +10,7 @@ Vendor ID Security
------------------ ------------------
This protocol does not create a device and thus requires no vendor ID set. This protocol does not create a device and thus requires no vendor ID set.
External interface access
-------------------------
This plugin requires access to the dbus interface `org.freedesktop.UPower`.

View File

@ -80,3 +80,7 @@ the other flash chip parameters. For example:
[Guid=VLI_USBHUB\\SPI_37303840] [Guid=VLI_USBHUB\\SPI_37303840]
SpiCmdChipErase = 0xc7 SpiCmdChipErase = 0xc7
SpiCmdSectorErase = 0x20 SpiCmdSectorErase = 0x20
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.

View File

@ -36,3 +36,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the udev vendor, in this instance set to `HIDRAW:0x056A` The vendor ID is set from the udev vendor, in this instance set to `HIDRAW:0x056A`
External interface access
-------------------------
This plugin requires ioctl `HIDIOCSFEATURE` access.

View File

@ -44,3 +44,7 @@ Vendor ID Security
------------------ ------------------
The vendor ID is set from the USB vendor, for example set to `USB:0x056A` The vendor ID is set from the USB vendor, for example set to `USB:0x056A`
External interface access
-------------------------
This plugin requires read/write access to `/dev/bus/usb`.