Review for Source Package: qrtr

[Summary]
qrtr is the userspace part for IPC communication with qualcomm processors. It 
is primarily used on mobile phones, but can also be relevant for ARM based 
laptops, such as the Lenovo X13s.

 MIR team ACK (pending security-team ACK), with some suggested
Recommended TODOs.

This does need a security review, so I'll assign ubuntu-security

List of specific binary packages to be promoted to main: libqrtr1, qrtr-tools
Specific binary packages built, but NOT to be promoted to main: None

Notes:
#0 requesting security review, because it's running a service as root, opening 
controll sockets, parsing protocol packages and having no hardening features 
enabled.
#1 This is needed for hardware enablement, no automatic testing can be 
provided, but the hardware is available and a test case described in the ISO 
tracker.

Required TODOs:
- None

Recommended TODOs:
#2 The package should get a team bug subscriber before being promoted
#3 Enablement of isolation/hardening features should be considered (e.g. as 
part of the systemd service)
#4 Adding (hardware independent) smoke tests during build-/autopkgtests should 
be considered, at least making sure the library can be compiled and loaded 
correctly
#5 Consider helping out uptream with adding documentation/man pages
#6 Consider supporting the Debian maintainer with more timely package updates 
after (rare) upstream releases are cut.

[Rationale, Duplication and Ownership]
There is no other package in main providing the same functionality.
A team is committed to own long term maintenance of this package.
The rationale given in the report seems valid and useful for Ubuntu

[Dependencies]
OK:
- no other Dependencies to MIR due to this
  - src:qrtr checked with `check-mir`
  - all dependencies can be found in `seeded-in-ubuntu` (already in main)
  - none of the (potentially auto-generated) dependencies (Depends
    and Recommends) that are present after build are not in main
- no -dev/-debug/-doc packages that need exclusion
- No dependencies in main that are only superficially tested requiring
  more tests now.

Problems: None

[Embedded sources and static linking]
OK:
- no embedded source present
- no static linking
- does not have unexpected Built-Using entries
- not a go package, no extra constraints to consider in that regard
- not a rust package, no extra constraints to consider in that regard

Problems: None

[Security]
OK:
- history of CVEs does not look concerning
- does not use webkit1,2
- does not use lib*v8 directly
- does not process arbitrary web content
- does not use centralized online accounts
- does not integrate arbitrary javascript into the desktop
- does not deal with system authentication (eg, pam), etc)
- does not deal with security attestation (secure boot, tpm, signatures)
- does not deal with cryptography (en-/decryption, certificates,
  signing, ...)

Problems:
- does run a daemon as root
- doesn't make appropriate (for its exposure) use of established risk
  mitigation features (dropping permissions, using temporary environments,
  restricted users/groups, seccomp, systemd isolation features,
  apparmor, ...)
- does parse data formats (QIPCRTR network packets, QMI structures, ...) from
  an untrusted source (userland).
- does expose any external endpoint (port/socket/... or similar)

[Common blockers]
OK:
 - does not FTBFS currently
- This does seem to need special HW for build or test so it can't be
  automatic at build or autopkgtest time. But as outlined
  by the requester in [Quality assurance - testing] there:
  - is hardware (Lenovo X13s) and a test plan or code (kernel & foundations, 
http://iso.qa.ubuntu.com/qatracker/milestones/449/builds/288343/testcases)
  - is community support to test this for Ubuntu
- no new python2 dependency
- not a Python package
- not a Go package

Problems:
- does not have a test suite that runs at build time
- does not have a non-trivial test suite that runs as autopkgtest

[Packaging red flags]
OK:
- Ubuntu does not carry a delta
- symbols tracking is in place.
- debian/watch is present and looks ok (if needed, e.g. non-native)
- the current release is packaged
- promoting this does not seem to cause issues for MOTUs that so far
  maintained the package
- no massive Lintian warnings
- debian/rules is rather clean
- It is not on the lto-disabled list

Problems:
- Upstream update history is sporadic
- Debian/Ubuntu update history is slow
- some lintian warnings:
W: qrtr-tools: no-manual-page [usr/bin/qrtr-{cfg,lookup,ns}]
X: qrtr-tools: systemd-service-file-missing-hardening-features 
[lib/systemd/system/qrtr-ns.service]

[Upstream red flags]
OK:
- no Errors/warnings during the build
- no incautious use of malloc/sprintf (as far as we can check it)
- no use of sudo, gksu, pkexec, or LD_LIBRARY_PATH (usage is OK inside tests)
- no use of user nobody
- no use of setuid / setgid
- no dependency on webkit, qtwebkit, seed or libgoa-*
- no important open bugs (crashers, etc) in Debian or Ubuntu
- not part of the UI for extra checks
- no translation present, but none needed for this case (user visible)?

Problems: None

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to qrtr in Ubuntu.
https://bugs.launchpad.net/bugs/2038942

Title:
  [MIR] protection-domain-mapper & qrtr

Status in protection-domain-mapper package in Ubuntu:
  New
Status in qrtr package in Ubuntu:
  New

Bug description:
  [Availability]
  The package protection-domain-mapper is already in Ubuntu universe.
  The package protection-domain-mapper build for the architectures it is 
designed to work on.
  It currently builds and works for architectures: any, verified as working on 
arm64
  Link to package https://launchpad.net/ubuntu/+source/protection-domain-mapper

  [Rationale]

  - The package protection-domain-mapper is required in Ubuntu main for
    ubuntu-desktop on ARM64, as it enables power-indicator (among other
    things) on most Windows on Arm laptops (qcom based laptops ~7 SKUs
    and more coming). There is no other way to implement this.

  - protection-domain-mapper depends on qrtr for library and a systemd
    service it provides.

  - There is no other/better way to solve this that is already in main
    or should go universe->main instead of this. As this is the only
    implementation of talking to the qcom hardware.

  - The package protection-domain-mapper is required in Ubuntu main no
    later than today due to Mantic release, if we want to have the best
    impression of Ubuntu Desktop in the live session on x13s.

  - If that fails, having it fixed as SRU is the next best option.

  [Security]

  - No CVEs/security issues in this software in the past. This is a
    reference open source implementation of these tools, which otherwise
    are used on qcom Android devices

  - no `suid` or `sgid` binaries no executables in `/sbin` and
    `/usr/sbin`

  - Package does install services: pd-mapper.service & qrtr-ns.service
    which allow runtime access to the qcom hardware which are run as
    root

  - Security has been kept in mind and common isolation/risk-mitigation
  patterns are in place utilizing the following features:

  - Packages does not open privileged ports (ports < 1024).

  - Package does not expose any external endpoints

  - Packages does not contain extensions to security-sensitive software
    (filters, scanners, plugins, UI skins, ...)

  [Quality assurance - function/usage]

  - The package works well right after install, i.e. power indicator
    straight away starts to show accurate battery information

  [Quality assurance - maintenance]
  - The package is maintained well in Debian/Ubuntu/Upstream and does
    not have too many, long-term & critical, open bugs
    - Ubuntu 
https://bugs.launchpad.net/ubuntu/+source/protection-domain-mapper/+bug
    https://bugs.launchpad.net/ubuntu/+source/qrtr/+bug
    - Debian 
https://bugs.debian.org/cgi-bin/pkgreport.cgi?src=protection-domain-mapper 
https://bugs.debian.org/cgi-bin/pkgreport.cgi?src=qrtr
    - Upstream's bug tracker, e.g., GitHub Issues

  - The package has important open bugs, listing them:
    
https://bugs.launchpad.net/ubuntu/+source/protection-domain-mapper/+bug/2038944
    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1045729 upstream fix at 
https://github.com/andersson/qrtr/pull/24/files

  - The package does deal with exotic hardware, it is present at Lenovo
    X13s to be able to test, fix and verify bugs as many users at
    Canonical and Community have it. And it is available for purchase.

  [Quality assurance - testing]

  - The package does not run a test at build time because adequate
    testing requires exotic hardware & specifically kernel driver loaded

  - The package does not run an autopkgtest because testing requires
    exotic hardware & specifically kernel driver loaded.

  - The package does have not failing autopkgtests right now

  - The package can not be well tested at build or autopkgtest time
    because it requires exotic hardware to test. To make up for that:
     - We have access to such hardware in the team (foundations & kernel)

     - We will add a run-once manual test case to iso tracker to ensure
       that "power indicator shows battery indicator %")

     - We will execute this test case on every upload of
       protection-domain-mapper qrtr and the underlying kernel, as well
       as image milestone testing

     - qrtr package is minimal and will be tested in a more wide
       reaching solution context protection-device-mapper, that is
       causing battery indicator to work.

  [Quality assurance - packaging]

  - debian/watch is present and works

  - debian/control defines a correct Maintainer field

  - This package does not yield massive lintian Warnings, Errors

    
https://udd.debian.org/lintian/?email1=&email2=&email3=&packages=qrtr&ignpackages=&format=html&lt_error=on&lt_warning=on&lt_information=on&lt_pedantic=on&lt_experimental=on&lt_overridden=on&lt_masked=on&lt_classification=on&lintian_tag=#all

    lack of manpages, lack of systemd hardening features in systemd unit

    https://udd.debian.org/lintian/?email1=&email2=&email3=&packages=protection-
  domain-
  
mapper&ignpackages=&format=html&lt_error=on&lt_warning=on&lt_information=on&lt_pedantic=on&lt_experimental=on&lt_overridden=on&lt_masked=on&lt_classification=on&lintian_tag=#all

    lack of manpage, lack of systemd hardening features in systemd unit

  - Please link to a recent build log of the package

    https://launchpad.net/ubuntu/+source/qrtr/1.0-2

    https://launchpad.net/ubuntu/+source/protection-domain-mapper/1.0-4

  - This package does not rely on obsolete or about to be demoted
  packages.

  - The package will be installed by default, but does not ask debconf
    questions higher than medium

  - Packaging and build is easy, link to debian/rules

    https://salsa.debian.org/DebianOnMobile-team/protection-domain-
  mapper/-/blob/debian/latest/debian/rules

    https://salsa.debian.org/DebianOnMobile-
  team/qrtr/-/blob/debian/latest/debian/rules

  [UI standards]

  - Application is not end-user facing (does not need translation)

  [Dependencies]
  - No further depends or recommends dependencies that are not yet in main

  [Standards compliance]
  - This package correctly follows FHS and Debian Policy

  [Maintenance/Owner]

  - The owning team will be kernel-packages and I have their
    acknowledgement for that commitment

  - This does not use static builds

  - This does not use vendored code

  - This does not use vendored code

  - This package is not rust based

  - The package successfully built during the most recent test rebuild

  [Background information]
  The Package description explains the package well
  Upstream Name matches package name

  Link to upstream project are: https://github.com/andersson/qrtr and
  https://github.com/andersson/pd-mapper

  This package unblocks announcement of Ubuntu Desktop on ARM64 Laptops
  for the first time, on an arm64 laptop from a tier 1 OEM available for
  sale now.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/protection-domain-mapper/+bug/2038942/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to