aboutsummaryrefslogtreecommitdiff
path: root/main.c
diff options
context:
space:
mode:
authorCynthia Revstrom <me@cynthia.re>2018-12-22 19:23:43 +0100
committerCynthia Revstrom <me@cynthia.re>2018-12-22 19:23:43 +0100
commit35ca59732221619f0e565d92f946b82fe1a4309b (patch)
treebfe3ca6200327efc971c1b73b883c16485f2172e /main.c
Initial commit
Diffstat (limited to 'main.c')
-rw-r--r--main.c81
1 files changed, 81 insertions, 0 deletions
diff --git a/main.c b/main.c
new file mode 100644
index 0000000..b397b8a
--- /dev/null
+++ b/main.c
@@ -0,0 +1,81 @@
+/*
+ *
+ * This is a part of taint-info.
+ * Copyright (C) 2018 Cynthia Revstrom <me@cynthia.re>
+ *
+ * taint-info is licensed under the MIT License.
+ * For a full license please refer to the LICENSE file in the root of the taint-info repository.
+ *
+ * The taint flag info in this file is from the Linux kernel documentation, available at: https://www.kernel.org/doc/Documentation/sysctl/kernel.txt
+ *
+ */
+
+#include <stdio.h>
+#include <stdlib.h>
+#include "taint_flags.h"
+
+void check_taint_flag(int taintval, int flag, char* flag_name, char* msg) {
+ if(taintval & flag) {
+ printf("%s: %s\n", flag_name, msg);
+ }
+}
+
+int main(int argc, char** argv) {
+ // Help with -h or --help
+ if (argc > 2) {
+ if(argv[1] == "-h" || argv[1] == "--help") {
+ printf("taint-info - Linux Kernel Taint Info\n");
+ printf("Copyright (C) 2018 Cynthia Revström <me@cynthia.re>\n");
+ printf("just run %s :)", argv[0]);
+ }
+ }
+
+ char buf[2048];
+ FILE* fh;
+ size_t size;
+
+ // Read /proc/sys/kernel/tainted
+ fh = fopen("/proc/sys/kernel/tainted", "r");
+ size = fread(&buf, 1, sizeof(buf), fh);
+ fclose(fh);
+
+ buf[size] = '\0';
+
+ // Parse the string from tainted to an int
+ char* end;
+ long l = strtol(buf, &end, 10);
+ int taintval = (int) l;
+
+
+ // Check the taint
+ if(taintval != 0) {
+ printf("Kernel is tainted :(\n");
+ printf("Taint value: %d\n", taintval);
+
+ // Check for taint flags
+ printf("Taint flags: \n");
+
+ check_taint_flag(taintval, TAINT_NON_GPL, "NON_GPL", "Non-GPL module loaded");
+ check_taint_flag(taintval, TAINT_FORCE_LOAD, "FORCE_LOAD", "Kernel module force loaded with insmod -f");
+ check_taint_flag(taintval, TAINT_UNSAFE_SMP, "UNSAFE_SMP", "SMP with CPU not designed for SMP");
+ check_taint_flag(taintval, TAINT_FORCE_UNLOAD, "FORCE_UNLOAD", "Kernel module force unloaded with rmmod -f");
+ check_taint_flag(taintval, TAINT_HW_CHECK_ERR, "HW_CHECK_ERR", "Hardware check error");
+ check_taint_flag(taintval, TAINT_BAD_PAGE, "BAD_PAGE", "A bad page was discovered on the system");
+ check_taint_flag(taintval, TAINT_MARK_TAINT, "MARK_TAINT", "The user has marked the software as tainted");
+ check_taint_flag(taintval, TAINT_SYSTEM_DIED, "SYSTEM_DIED", "The system has died");
+ check_taint_flag(taintval, TAINT_ACPI_DSDT_OVERRIDE, "ACPI_DSDT_OVERRIDE", "The ACPI DSDT has been overridden");
+ check_taint_flag(taintval, TAINT_KERNEL_WARN, "KERNEL_WARN", "A kernel warning has occured");
+ check_taint_flag(taintval, TAINT_MOD_STAGING, "MOD_STAGING", "A module from drivers/staging was loaded");
+ check_taint_flag(taintval, TAINT_SYS_FW_BUG, "SYS_FW_BUG", "The system is working around a severe firmware bug");
+ check_taint_flag(taintval, TAINT_OOT_MOD, "OOT_MOD", "An out-of-tree-module has been loaded");
+ check_taint_flag(taintval, TAINT_UNSIGNED, "UNSIGNED", "An unsigned module has been loaded into a kernel supporting module signatures");
+ check_taint_flag(taintval, TAINT_SOFT_LOCKUP, "SOFT_LOCKUP", "A soft lockup has previously occured on the system");
+ check_taint_flag(taintval, TAINT_LIVE_PATCHED, "LIVE_PATCHED", "The kernel has been live patched");
+ check_taint_flag(taintval, TAINT_AUX, "AUX", "Auxiliary taint, defined and used by distros");
+ check_taint_flag(taintval, TAINT_STRUCT_RANDOM, "STRUCT_RANDOM", "The kernel was built with the struct randomization plugin");
+ } else {
+ printf("Kernel is not tainted :)");
+ }
+
+ return 0;
+}