mirror of
https://git.proxmox.com/git/fwupd
synced 2025-05-02 16:45:45 +00:00

This indicates the GUID in some way contributed to the result decided. It also allows us to match the submitted HSI results back to a firmware stream on the LVFS, which allows us to allow vendors to see a subset of results for uploaded devices.
179 lines
5.0 KiB
C
179 lines
5.0 KiB
C
/*
|
|
* Copyright (C) 2019 Richard Hughes <richard@hughsie.com>
|
|
*
|
|
* SPDX-License-Identifier: LGPL-2.1+
|
|
*/
|
|
|
|
#include "config.h"
|
|
|
|
#include <fwupdplugin.h>
|
|
|
|
#include "fu-tpm-eventlog-device.h"
|
|
|
|
struct FuPluginData {
|
|
GPtrArray *pcr0s;
|
|
FuDevice *tpm_device;
|
|
gboolean has_uefi_device;
|
|
gboolean reconstructed;
|
|
};
|
|
|
|
void
|
|
fu_plugin_init(FuPlugin *plugin)
|
|
{
|
|
fu_plugin_alloc_data(plugin, sizeof(FuPluginData));
|
|
fu_plugin_add_rule(plugin, FU_PLUGIN_RULE_RUN_BEFORE, "uefi_capsule");
|
|
fu_plugin_add_rule(plugin, FU_PLUGIN_RULE_RUN_AFTER, "tpm");
|
|
fu_plugin_set_build_hash(plugin, FU_BUILD_HASH);
|
|
}
|
|
|
|
void
|
|
fu_plugin_destroy(FuPlugin *plugin)
|
|
{
|
|
FuPluginData *data = fu_plugin_get_data(plugin);
|
|
if (data->pcr0s != NULL)
|
|
g_ptr_array_unref(data->pcr0s);
|
|
if (data->tpm_device != NULL)
|
|
g_object_unref(data->tpm_device);
|
|
}
|
|
|
|
gboolean
|
|
fu_plugin_coldplug(FuPlugin *plugin, GError **error)
|
|
{
|
|
FuContext *ctx = fu_plugin_get_context(plugin);
|
|
FuPluginData *data = fu_plugin_get_data(plugin);
|
|
gsize bufsz = 0;
|
|
const gchar *fn = "/sys/kernel/security/tpm0/binary_bios_measurements";
|
|
g_autofree gchar *str = NULL;
|
|
g_autofree guint8 *buf = NULL;
|
|
g_autoptr(FuTpmEventlogDevice) dev = NULL;
|
|
|
|
if (!g_file_get_contents(fn, (gchar **)&buf, &bufsz, error))
|
|
return FALSE;
|
|
if (bufsz == 0) {
|
|
g_set_error(error,
|
|
FWUPD_ERROR,
|
|
FWUPD_ERROR_INVALID_FILE,
|
|
"failed to read data from %s",
|
|
fn);
|
|
return FALSE;
|
|
}
|
|
dev = fu_tpm_eventlog_device_new(ctx, buf, bufsz, error);
|
|
if (dev == NULL)
|
|
return FALSE;
|
|
if (!fu_device_setup(FU_DEVICE(dev), error))
|
|
return FALSE;
|
|
|
|
/* save this so we can compare against system-firmware */
|
|
data->pcr0s = fu_tpm_eventlog_device_get_checksums(dev, 0, error);
|
|
if (data->pcr0s == NULL)
|
|
return FALSE;
|
|
for (guint i = 0; i < data->pcr0s->len; i++) {
|
|
const gchar *csum = g_ptr_array_index(data->pcr0s, i);
|
|
fu_device_add_checksum(FU_DEVICE(dev), csum);
|
|
}
|
|
for (guint i = 0; i < data->pcr0s->len; i++) {
|
|
const gchar *csum = g_ptr_array_index(data->pcr0s, i);
|
|
GChecksumType csum_type = fwupd_checksum_guess_kind(csum);
|
|
if (csum_type == G_CHECKSUM_SHA1) {
|
|
fu_plugin_add_report_metadata(plugin, "Pcr0_SHA1", csum);
|
|
continue;
|
|
}
|
|
if (csum_type == G_CHECKSUM_SHA256) {
|
|
fu_plugin_add_report_metadata(plugin, "Pcr0_SHA256", csum);
|
|
continue;
|
|
}
|
|
}
|
|
|
|
/* add optional report metadata */
|
|
str = fu_tpm_eventlog_device_report_metadata(dev);
|
|
fu_plugin_add_report_metadata(plugin, "TpmEventLog", str);
|
|
fu_plugin_device_add(plugin, FU_DEVICE(dev));
|
|
return TRUE;
|
|
}
|
|
|
|
static void
|
|
fu_plugin_device_registered_tpm(FuPlugin *plugin, FuDevice *device)
|
|
{
|
|
FuPluginData *data = fu_plugin_get_data(plugin);
|
|
g_set_object(&data->tpm_device, device);
|
|
}
|
|
|
|
static void
|
|
fu_plugin_device_registered_uefi(FuPlugin *plugin, FuDevice *device)
|
|
{
|
|
FuPluginData *data = fu_plugin_get_data(plugin);
|
|
GPtrArray *checksums;
|
|
|
|
/* only the system-firmware device gets checksums */
|
|
checksums = fu_device_get_checksums(device);
|
|
if (checksums->len == 0)
|
|
return;
|
|
data->has_uefi_device = TRUE;
|
|
|
|
for (guint i = 0; i < checksums->len; i++) {
|
|
const gchar *checksum = g_ptr_array_index(checksums, i);
|
|
data->reconstructed = FALSE;
|
|
for (guint j = 0; j < data->pcr0s->len; j++) {
|
|
const gchar *checksum_tmp = g_ptr_array_index(data->pcr0s, j);
|
|
/* skip unless same algorithm */
|
|
if (strlen(checksum) != strlen(checksum_tmp))
|
|
continue;
|
|
if (g_strcmp0(checksum, checksum_tmp) == 0) {
|
|
data->reconstructed = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
/* check at least one reconstruction for this algorithm */
|
|
if (!data->reconstructed)
|
|
return;
|
|
}
|
|
}
|
|
|
|
void
|
|
fu_plugin_device_registered(FuPlugin *plugin, FuDevice *device)
|
|
{
|
|
/* only care about UEFI devices from ESRT */
|
|
if (g_strcmp0(fu_device_get_plugin(device), "uefi_capsule") == 0) {
|
|
fu_plugin_device_registered_uefi(plugin, device);
|
|
return;
|
|
}
|
|
|
|
/* detect the system TPM device */
|
|
if (g_strcmp0(fu_device_get_plugin(device), "tpm") == 0) {
|
|
fu_plugin_device_registered_tpm(plugin, device);
|
|
return;
|
|
}
|
|
}
|
|
|
|
void
|
|
fu_plugin_add_security_attrs(FuPlugin *plugin, FuSecurityAttrs *attrs)
|
|
{
|
|
FuPluginData *data = fu_plugin_get_data(plugin);
|
|
g_autoptr(FwupdSecurityAttr) attr = NULL;
|
|
|
|
/* no TPM device */
|
|
if (data->tpm_device == NULL)
|
|
return;
|
|
|
|
/* create attr */
|
|
attr = fwupd_security_attr_new(FWUPD_SECURITY_ATTR_ID_TPM_RECONSTRUCTION_PCR0);
|
|
fwupd_security_attr_set_plugin(attr, fu_plugin_get_name(plugin));
|
|
fwupd_security_attr_set_level(attr, FWUPD_SECURITY_ATTR_LEVEL_IMPORTANT);
|
|
fwupd_security_attr_add_guids(attr, fu_device_get_guids(data->tpm_device));
|
|
fu_security_attrs_append(attrs, attr);
|
|
|
|
/* check reconstructed to PCR0 */
|
|
if (fu_plugin_has_flag(plugin, FWUPD_PLUGIN_FLAG_DISABLED) || !data->has_uefi_device) {
|
|
fwupd_security_attr_set_result(attr, FWUPD_SECURITY_ATTR_RESULT_NOT_FOUND);
|
|
return;
|
|
}
|
|
if (!data->reconstructed) {
|
|
fwupd_security_attr_set_result(attr, FWUPD_SECURITY_ATTR_RESULT_NOT_VALID);
|
|
return;
|
|
}
|
|
|
|
/* success */
|
|
fwupd_security_attr_add_flag(attr, FWUPD_SECURITY_ATTR_FLAG_SUCCESS);
|
|
fwupd_security_attr_set_result(attr, FWUPD_SECURITY_ATTR_RESULT_VALID);
|
|
}
|