Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2660897pxb; Tue, 19 Jan 2021 02:58:47 -0800 (PST) X-Google-Smtp-Source: ABdhPJwlANukX7FTux6yT3pvA46zVGWKU84E3eZVw0R/9qEAIWb2hX0v4d1VHRBVQnlLNOQoey6E X-Received: by 2002:a50:9ee9:: with SMTP id a96mr2891605edf.343.1611053926996; Tue, 19 Jan 2021 02:58:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611053926; cv=none; d=google.com; s=arc-20160816; b=0BP5jMszhPqvVbZ+hY0+DopXvQlOq/8RDFtrlH9Ma6efa/7y5SAaAZR0yudrQWA2nP RRkjjY7fxSow3bpYbcOaaiKmbcUuaxnV5j2BfwBcbQ4+Pk9QfbGh8wH1rG4dTlQENF1n XaSI5MJokO10EzXXusd7boZonoHBZjUAbnTcyoOwacJiIvJ6IE2ZSSxkgl8a3/ZC+AFr R0XOQL390IK/xMHubI1nfbHjDcFNzaEPbHlnqFigRb6qMofU4VARYioKguXZnC+pdc3n DYsuf+tmpZygq529ZczCxeuZgaPdLkj7jnZ8S1HUapGTYRMAlsdyamz2uv8T3c7cBdvk eLRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:message-id:references:in-reply-to :subject:cc:to:from:date:content-transfer-encoding:mime-version :sender:dkim-signature; bh=IqeHm+djSYXGS6nhOsGbWQeydkemPXwx6MDMvUpsZlU=; b=ceexLvMN5UQeeJpCHCcDiave1oEqPL/x98yMCUIpW6QTLmfZYDrARBC+Dnm6rSQRWd hzmiJGzfX0RWnh8l0g4dxG37RoLx/iKwfXRSBna+ZqA7FivAGqeLIv6Y8pTRFtkRCnXU td2LTgfwKS1ZHnNyxlY7HXlwBE6NBjwyfMLThq8X2WS66/qDDPM6rqTTBJE51dLxcHB0 JPucksGK0K2tJWKkfnuNnIf5nQavZ3s4uyPWAj/Tw1BSj/G6tPR2XISnY2mAHf3Ew6sK cSRTB6A1pTC87kghpffMi6dVifDHkTNFVfUDl2QebSZkoFv40TPjKHAGrnfIovLD6kP+ EU2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b=T2Y75fKz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f14si2167826ejc.535.2021.01.19.02.58.24; Tue, 19 Jan 2021 02:58:46 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b=T2Y75fKz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389426AbhASKE2 (ORCPT + 99 others); Tue, 19 Jan 2021 05:04:28 -0500 Received: from a1.mail.mailgun.net ([198.61.254.60]:58703 "EHLO a1.mail.mailgun.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389152AbhASJwM (ORCPT ); Tue, 19 Jan 2021 04:52:12 -0500 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1611049915; h=Message-ID: References: In-Reply-To: Subject: Cc: To: From: Date: Content-Transfer-Encoding: Content-Type: MIME-Version: Sender; bh=IqeHm+djSYXGS6nhOsGbWQeydkemPXwx6MDMvUpsZlU=; b=T2Y75fKzi8Ypj6JPA+r4oowR5uZXn+00rxMJueFPk0/6zvOKlFmDnArLa0FN7jgawOOzUnxa 2kLfgMokC7ZxZj9C/oCD3OYbH+ZAdkYO2s7AhV0ErjBWgIL1wb34WiCmdn1ceyMAafGdBzSU SROsoZng/kOXJaFw0ws53PXtKcY= X-Mailgun-Sending-Ip: 198.61.254.60 X-Mailgun-Sid: WyI0MWYwYSIsICJsaW51eC1rZXJuZWxAdmdlci5rZXJuZWwub3JnIiwgImJlOWU0YSJd Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by smtp-out-n06.prod.us-west-2.postgun.com with SMTP id 6006ab9721210999ed6440bb (version=TLS1.2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256); Tue, 19 Jan 2021 09:51:19 GMT Sender: saiprakash.ranjan=codeaurora.org@mg.codeaurora.org Received: by smtp.codeaurora.org (Postfix, from userid 1001) id E0DACC433C6; Tue, 19 Jan 2021 09:51:18 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=ALL_TRUSTED,BAYES_00 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.codeaurora.org (localhost.localdomain [127.0.0.1]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: saiprakash.ranjan) by smtp.codeaurora.org (Postfix) with ESMTPSA id C7113C433CA; Tue, 19 Jan 2021 09:51:17 +0000 (UTC) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Tue, 19 Jan 2021 15:21:17 +0530 From: Sai Prakash Ranjan To: Al Grant Cc: Mathieu Poirier , Suzuki Poulose , Mike Leach , coresight@lists.linaro.org, Stephen Boyd , Denis Nikitin , linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, leo.yan@linaro.org, mnissler@google.com Subject: Re: [PATCH] coresight: etm4x: Add config to exclude kernel mode tracing In-Reply-To: References: <20201015124522.1876-1-saiprakash.ranjan@codeaurora.org> <20201015160257.GA1450102@xps15> <20210118202354.GC464579@xps15> <32216e9fa5c9ffb9df1123792d40eafb@codeaurora.org> Message-ID: <03b893801841f732a25072b4e62f8e0b@codeaurora.org> X-Sender: saiprakash.ranjan@codeaurora.org User-Agent: Roundcube Webmail/1.3.9 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Al, On 2021-01-19 14:06, Al Grant wrote: > Hi Sai, > >> From: saiprakash.ranjan=codeaurora.org@mg.codeaurora.org >> Hi Mathieu, >> >> On 2021-01-19 01:53, Mathieu Poirier wrote: >> > On Fri, Jan 15, 2021 at 11:16:24AM +0530, Sai Prakash Ranjan wrote: >> >> Hello Mathieu, Suzuki >> >> >> >> On 2020-10-15 21:32, Mathieu Poirier wrote: >> >> > On Thu, Oct 15, 2020 at 06:15:22PM +0530, Sai Prakash Ranjan wrote: >> >> > > On production systems with ETMs enabled, it is preferred to >> >> > > exclude kernel mode(NS EL1) tracing for security concerns and >> >> > > support only userspace(NS EL0) tracing. So provide an option via >> >> > > kconfig to exclude kernel mode tracing if it is required. >> >> > > This config is disabled by default and would not affect the >> >> > > current configuration which has both kernel and userspace tracing >> >> > > enabled by default. >> >> > > >> >> > >> >> > One requires root access (or be part of a special trace group) to >> >> > be able to use the cs_etm PMU. With this kind of elevated access >> >> > restricting tracing at EL1 provides little in terms of security. >> >> > >> >> >> >> Apart from the VM usecase discussed, I am told there are other >> >> security concerns here regarding need to exclude kernel mode tracing >> >> even for the privileged users/root. One such case being the ability >> >> to analyze cryptographic code execution since ETMs can record all >> >> branch instructions including timestamps in the kernel and there may >> >> be other cases as well which I may not be aware of and hence have >> >> added Denis and Mattias. Please let us know if you have any questions >> >> further regarding this not being a security concern. >> > >> > Even if we were to apply this patch there are many ways to compromise >> > a system or get the kernel to reveal important information using the >> > perf subsystem. I would perfer to tackle the problem at that level >> > rather than concentrating on coresight. >> > >> >> Sorry but I did not understand your point. We are talking about the >> capabilities >> of coresight etm tracing which has the instruction level tracing and a >> lot more. >> Perf subsystem is just the framework used for it. >> In other words, its not the perf subsystem which does instruction >> level tracing, >> its the coresight etm. Why the perf subsystem should be modified to >> lockdown >> kernel mode? If we were to let perf handle all the trace filtering for >> different >> exception levels, then why do we need the register settings in >> coresight etm >> driver to filter out NS EL* tracing? And more importantly, how do you >> suppose >> we handle sysfs mode of coresight tracing with perf subsystem? > > You both have good points. Mathieu is right that this is not a > CoreSight > issue specifically, it is a matter of kernel security policy, and other > hardware > tracing mechanisms ought to be within its scope. There should be a > general > "anti kernel exfiltration" config that applies to all mechanisms within > its scope, and we'd definitely expect that to include Intel PT as well > as ETM. > I agree with this part where there should be a generic config for all hardware tracing families(atleast for Intel PT and ARM Coresight), Suzuki suggested that as well. I am under the impression that Mathieu didn't like adding such a config and wanted perf subsystem to handle it since initial discussion was around whether root compromise meant everything is lost already and such a kconfig would not help, but Mattias already gave some good examples where that is not true. > A kernel config that forced exclude_kernel on all perf events would > deal with > ETM and PT in one place, but miss the sysfs interface to ETM. > > On the other hand, doing it in the ETM drivers would cover the perf and > sysfs > interfaces to ETM, but would miss Intel PT. > > So I think what is needed is a general config option that is both > implemented > in perf (excluding all kernel tracing events) and by any drivers that > provide > an alternative interface to hardware tracing events. > I am good with this approach, once Mathieu confirms, I can add a kernel wide kconfig as Suzuki suggested earlier and make ETM{3,4}x as the initial users. Someone more familiar with Intel PTs can then make use of this kconfig. Thanks, Sai -- QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation