/* * Copyright (C) 2020 Richard Hughes * * SPDX-License-Identifier: LGPL-2.1+ */ #include "config.h" #include struct FuPluginData { GFile *file; GFileMonitor *monitor; }; #define KERNEL_TAINT_FLAG_PROPRIETARY_MODULE (1 << 0) #define KERNEL_TAINT_FLAG_MODULE_FORCE_LOAD (1 << 1) #define KERNEL_TAINT_FLAG_KERNEL_OUT_OF_SPEC (1 << 2) #define KERNEL_TAINT_FLAG_MODULE_FORCE_UNLOAD (1 << 3) #define KERNEL_TAINT_FLAG_PROCESSOR_MCE (1 << 4) #define KERNEL_TAINT_FLAG_BAD_PAGE (1 << 5) #define KERNEL_TAINT_FLAG_REQUESTED_BY_USERSPACE (1 << 6) #define KERNEL_TAINT_FLAG_KERNEL_DIED (1 << 7) #define KERNEL_TAINT_FLAG_ACPI_OVERRIDDEN (1 << 8) #define KERNEL_TAINT_FLAG_KERNEL_ISSUED_WARNING (1 << 9) #define KERNEL_TAINT_FLAG_STAGING_DRIVER_LOADED (1 << 10) #define KERNEL_TAINT_FLAG_FIRMWARE_WORKAROUND_APPLIED (1 << 11) #define KERNEL_TAINT_FLAG_EXTERNAL_MODULE_LOADED (1 << 12) #define KERNEL_TAINT_FLAG_UNSIGNED_MODULE_LOADED (1 << 13) #define KERNEL_TAINT_FLAG_SOFT_LOCKUP_OCCURRED (1 << 14) #define KERNEL_TAINT_FLAG_KERNEL_LIVE_PATCHED (1 << 15) #define KERNEL_TAINT_FLAG_AUXILIARY_TAINT (1 << 16) #define KERNEL_TAINT_FLAG_STRUCT_RANDOMIZATION_PLUGIN (1 << 17) #define KERNEL_TAINT_FLAG_IN_KERNEL_TEST (1 << 18) static void fu_plugin_linux_tainted_init(FuPlugin *plugin) { fu_plugin_alloc_data(plugin, sizeof(FuPluginData)); } static void fu_plugin_linux_tainted_destroy(FuPlugin *plugin) { FuPluginData *priv = fu_plugin_get_data(plugin); if (priv->file != NULL) g_object_unref(priv->file); if (priv->monitor != NULL) { g_file_monitor_cancel(priv->monitor); g_object_unref(priv->monitor); } } static void fu_plugin_linux_tainted_changed_cb(GFileMonitor *monitor, GFile *file, GFile *other_file, GFileMonitorEvent event_type, gpointer user_data) { FuPlugin *plugin = FU_PLUGIN(user_data); FuContext *ctx = fu_plugin_get_context(plugin); fu_context_security_changed(ctx); } static gboolean fu_plugin_linux_tainted_startup(FuPlugin *plugin, FuProgress *progress, GError **error) { FuPluginData *priv = fu_plugin_get_data(plugin); g_autofree gchar *fn = NULL; g_autofree gchar *procfs = NULL; procfs = fu_path_from_kind(FU_PATH_KIND_PROCFS); fn = g_build_filename(procfs, "sys", "kernel", "tainted", NULL); priv->file = g_file_new_for_path(fn); priv->monitor = g_file_monitor(priv->file, G_FILE_MONITOR_NONE, NULL, error); if (priv->monitor == NULL) return FALSE; g_signal_connect(G_FILE_MONITOR(priv->monitor), "changed", G_CALLBACK(fu_plugin_linux_tainted_changed_cb), plugin); return TRUE; } static void fu_plugin_linux_tainted_add_security_attrs(FuPlugin *plugin, FuSecurityAttrs *attrs) { FuPluginData *priv = fu_plugin_get_data(plugin); gsize bufsz = 0; guint64 value = 0; g_autofree gchar *buf = NULL; g_autofree gchar *str = NULL; g_autoptr(FwupdSecurityAttr) attr = NULL; g_autoptr(GError) error_local = NULL; /* create attr */ attr = fu_plugin_security_attr_new(plugin, FWUPD_SECURITY_ATTR_ID_KERNEL_TAINTED); fwupd_security_attr_add_flag(attr, FWUPD_SECURITY_ATTR_FLAG_RUNTIME_ISSUE); fu_security_attrs_append(attrs, attr); if (priv == NULL) { fwupd_security_attr_add_flag(attr, FWUPD_SECURITY_ATTR_FLAG_MISSING_DATA); return; } /* load file */ if (!g_file_load_contents(priv->file, NULL, &buf, &bufsz, NULL, &error_local)) { g_autofree gchar *fn = g_file_get_path(priv->file); g_warning("could not open %s: %s", fn, error_local->message); fwupd_security_attr_set_result(attr, FWUPD_SECURITY_ATTR_RESULT_NOT_VALID); return; } /* do not assume NUL terminated */ str = g_strndup(buf, bufsz); if (!fu_strtoull(str, &value, 0, G_MAXUINT64, &error_local)) { g_warning("could not parse %s: %s", str, error_local->message); fwupd_security_attr_set_result(attr, FWUPD_SECURITY_ATTR_RESULT_NOT_VALID); return; } /* only some taint flags are important */ if ((value & KERNEL_TAINT_FLAG_PROPRIETARY_MODULE) > 0 || (value & KERNEL_TAINT_FLAG_MODULE_FORCE_LOAD) > 0 || (value & KERNEL_TAINT_FLAG_MODULE_FORCE_UNLOAD) > 0 || (value & KERNEL_TAINT_FLAG_STAGING_DRIVER_LOADED) > 0 || (value & KERNEL_TAINT_FLAG_EXTERNAL_MODULE_LOADED) > 0 || (value & KERNEL_TAINT_FLAG_UNSIGNED_MODULE_LOADED) > 0 || (value & KERNEL_TAINT_FLAG_ACPI_OVERRIDDEN) > 0 || (value & KERNEL_TAINT_FLAG_AUXILIARY_TAINT) > 0) { fwupd_security_attr_set_result(attr, FWUPD_SECURITY_ATTR_RESULT_TAINTED); fwupd_security_attr_add_flag(attr, FWUPD_SECURITY_ATTR_FLAG_ACTION_CONFIG_OS); return; } /* success */ fwupd_security_attr_add_flag(attr, FWUPD_SECURITY_ATTR_FLAG_SUCCESS); fwupd_security_attr_set_result(attr, FWUPD_SECURITY_ATTR_RESULT_NOT_TAINTED); } void fu_plugin_init_vfuncs(FuPluginVfuncs *vfuncs) { vfuncs->build_hash = FU_BUILD_HASH; vfuncs->init = fu_plugin_linux_tainted_init; vfuncs->destroy = fu_plugin_linux_tainted_destroy; vfuncs->startup = fu_plugin_linux_tainted_startup; vfuncs->add_security_attrs = fu_plugin_linux_tainted_add_security_attrs; }