Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp3324199pxb; Tue, 19 Jan 2021 21:34:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJxLkJJLhpSlDpcG9HVizNiVOqOyYjnhpHSCuZB21xiLpR3ZCEpXZfBkPcj0+9O0zeyieDwq X-Received: by 2002:a17:906:dfd3:: with SMTP id jt19mr5041866ejc.64.1611120852538; Tue, 19 Jan 2021 21:34:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611120852; cv=none; d=google.com; s=arc-20160816; b=ZtDNfdBSkw66KuWMktOS1EUtlFZgnKsbCKoPbIKDFfgULwGK58rN9nL4QWicX1nbvJ oD1/n0XlfHHjrUkdgwgyY+Fk57pZDdw00Y6nRQ/yZBSYHmRaYzPL2YD3Ff8XH5+9dG9P vu6omzTZ0Ew+gh9Ej5DRdb8Utso1HIX1HzJOJQ2Jb0Go0Ks/f80qsdXO+1aIzg8tNYmB swhM8FH2iBDdN0Wc10OZtRupfRmOVnIV/HknykfZy7hDbX0UJIAJR+gnYrypkLR7KDqD Ez6swxlAeUb9IrF5gxEyWeJfsMAeYN8qdGr23Z5VXmvBuiZPC1E9sJfVKBjyRHDmNsaS IVhw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:message-id:references:in-reply-to :subject:cc:to:from:date:content-transfer-encoding:mime-version :sender:dkim-signature; bh=ORUMplqyK6IaDqFhTEvsF33PBH35b7H9236CHedemic=; b=Q3jwD581ahYQEnEPRLV2RfOVnyGJgnqJNh1y7NxVi508BLak8/vIfmKOk0UaY8vYJb 2QJblrWGbGgJMWBtUYiaizkB2PzUC1zAh96HyslfS4WyRtIAESSXGTSmgs9BY9O7q6+M 4hMpFf+wdhhKHi315WEuM/KZl96TnFCvZhudeh2ZP2UXa7BsCQCZo3q5yCwD5uyps7xx X+mMbMekcko2wmIdQ0Cxn5K5b9iFHYXfEIvgZ31/i01uKDLao2brawg5R9U5ZjU3A/lK iYO6k9mT9Ive+XAsbizFIvj82CojJgwRhuCKkGG+zdPQOTLa+DCf8h8mnacwz7bDtX+q eDaw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b=e+wTX6PW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p31si439045edd.471.2021.01.19.21.33.47; Tue, 19 Jan 2021 21:34:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b=e+wTX6PW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729648AbhATFVc (ORCPT + 99 others); Wed, 20 Jan 2021 00:21:32 -0500 Received: from a1.mail.mailgun.net ([198.61.254.60]:27859 "EHLO a1.mail.mailgun.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729781AbhATFOy (ORCPT ); Wed, 20 Jan 2021 00:14:54 -0500 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1611119665; h=Message-ID: References: In-Reply-To: Subject: Cc: To: From: Date: Content-Transfer-Encoding: Content-Type: MIME-Version: Sender; bh=ORUMplqyK6IaDqFhTEvsF33PBH35b7H9236CHedemic=; b=e+wTX6PW7QbeVmw1ltyxm1gYjT9UnUIfJRy5n0ulChof/oXQX45bFXAP+w8Y9reTVvXzXMyw QnoDxQXj5huoqHRU8crF2bB9f/LnmuLxvF5KRxgO7QiavOqbd8qcQVU1q2x31ZHRDR2Zpccb iFEcGrARXIDZWTQuVtUSZ2UFisQ= X-Mailgun-Sending-Ip: 198.61.254.60 X-Mailgun-Sid: WyI0MWYwYSIsICJsaW51eC1rZXJuZWxAdmdlci5rZXJuZWwub3JnIiwgImJlOWU0YSJd Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by smtp-out-n03.prod.us-east-1.postgun.com with SMTP id 6007bc17e23dedcc3a11fe5c (version=TLS1.2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256); Wed, 20 Jan 2021 05:13:59 GMT Sender: saiprakash.ranjan=codeaurora.org@mg.codeaurora.org Received: by smtp.codeaurora.org (Postfix, from userid 1001) id 84062C4331D; Wed, 20 Jan 2021 05:13:57 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=ALL_TRUSTED,BAYES_00, URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.codeaurora.org (localhost.localdomain [127.0.0.1]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: saiprakash.ranjan) by smtp.codeaurora.org (Postfix) with ESMTPSA id AB88DC43464; Wed, 20 Jan 2021 05:13:54 +0000 (UTC) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Date: Wed, 20 Jan 2021 10:43:54 +0530 From: Sai Prakash Ranjan To: Al Grant Cc: Suzuki Poulose , Mark Rutland , Denis Nikitin , Mathieu Poirier , Peter Zijlstra , linux-arm-msm@vger.kernel.org, coresight@lists.linaro.org, linux-kernel@vger.kernel.org, Stephen Boyd , Will Deacon , Ingo Molnar , leo.yan@linaro.org, mnissler@google.com, linux-arm-kernel@lists.infradead.org, Mike Leach Subject: Re: [PATCH] coresight: etm4x: Add config to exclude kernel mode tracing In-Reply-To: References: <20201015124522.1876-1-saiprakash.ranjan@codeaurora.org> <20201015160257.GA1450102@xps15> <20210118202354.GC464579@xps15> <32216e9fa5c9ffb9df1123792d40eafb@codeaurora.org> <03b893801841f732a25072b4e62f8e0b@codeaurora.org> Message-ID: X-Sender: saiprakash.ranjan@codeaurora.org User-Agent: Roundcube Webmail/1.3.9 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Al, On 2021-01-19 17:26, Al Grant wrote: >> From: Suzuki K Poulose >> On 1/19/21 9:51 AM, Sai Prakash Ranjan wrote: >> > Hi Al, >> > >> > On 2021-01-19 14:06, Al Grant wrote: >> >> Hi Sai, >> >> >> >>> From: saiprakash.ranjan=codeaurora.org@mg.codeaurora.org >> >>> Hi Mathieu, >> >>> >> >>> On 2021-01-19 01:53, Mathieu Poirier wrote: >> >>> > On Fri, Jan 15, 2021 at 11:16:24AM +0530, Sai Prakash Ranjan wrote: >> >>> >> Hello Mathieu, Suzuki >> >>> >> >> >>> >> On 2020-10-15 21:32, Mathieu Poirier wrote: >> >>> >> > On Thu, Oct 15, 2020 at 06:15:22PM +0530, Sai Prakash Ranjan wrote: >> >>> >> > > On production systems with ETMs enabled, it is preferred to >> >>> >> > > exclude kernel mode(NS EL1) tracing for security concerns and >> >>> >> > > support only userspace(NS EL0) tracing. So provide an option >> >>> >> > > via kconfig to exclude kernel mode tracing if it is required. >> >>> >> > > This config is disabled by default and would not affect the >> >>> >> > > current configuration which has both kernel and userspace >> >>> >> > > tracing enabled by default. >> >>> >> > > >> >>> >> > >> >>> >> > One requires root access (or be part of a special trace group) >> >>> >> > to be able to use the cs_etm PMU.  With this kind of elevated >> >>> >> > access restricting tracing at EL1 provides little in terms of security. >> >>> >> > >> >>> >> >> >>> >> Apart from the VM usecase discussed, I am told there are other >> >>> >> security concerns here regarding need to exclude kernel mode >> >>> >> tracing even for the privileged users/root. One such case being >> >>> >> the ability to analyze cryptographic code execution since ETMs >> >>> >> can record all branch instructions including timestamps in the >> >>> >> kernel and there may be other cases as well which I may not be >> >>> >> aware of and hence have added Denis and Mattias. Please let us >> >>> >> know if you have any questions further regarding this not being a security >> concern. >> >>> > >> >>> > Even if we were to apply this patch there are many ways to >> >>> > compromise a system or get the kernel to reveal important >> >>> > information using the perf subsystem.  I would perfer to tackle >> >>> > the problem at that level rather than concentrating on coresight. >> >>> > >> >>> >> >>> Sorry but I did not understand your point. We are talking about the >> >>> capabilities of coresight etm tracing which has the instruction level tracing >> and a lot more. >> >>> Perf subsystem is just the framework used for it. >> >>> In other words, its not the perf subsystem which does instruction >> >>> level tracing, its the coresight etm. Why the perf subsystem should >> >>> be modified to lockdown kernel mode? If we were to let perf handle >> >>> all the trace filtering for different exception levels, then why do >> >>> we need the register settings in coresight etm driver to filter out >> >>> NS EL* tracing? And more importantly, how do you suppose we handle sysfs >> mode of coresight tracing with perf subsystem? >> >> >> >> You both have good points. Mathieu is right that this is not a >> >> CoreSight issue specifically, it is a matter of kernel security >> >> policy, and other hardware tracing mechanisms ought to be within its >> >> scope. There should be a general "anti kernel exfiltration" config >> >> that applies to all mechanisms within its scope, and we'd definitely expect >> that to include Intel PT as well as ETM. >> >> >> > >> > I agree with this part where there should be a generic config for all >> > hardware tracing families(atleast for Intel PT and ARM Coresight), >> > Suzuki suggested that as well. I am under the impression that Mathieu >> > didn't like adding such a config and wanted perf subsystem to handle >> > it since initial discussion was around whether root compromise meant >> > everything is lost already and such a kconfig would not help, but >> > Mattias already gave some good examples where that is not true. >> > >> >> A kernel config that forced exclude_kernel on all perf events would >> >> deal with ETM and PT in one place, but miss the sysfs interface to ETM. >> >> >> >> On the other hand, doing it in the ETM drivers would cover the perf >> >> and sysfs interfaces to ETM, but would miss Intel PT. >> >> >> >> So I think what is needed is a general config option that is both >> >> implemented in perf (excluding all kernel tracing events) and by any >> >> drivers that provide an alternative interface to hardware tracing events. >> >> >> > >> > I am good with this approach, once Mathieu confirms, I can add a >> > kernel wide kconfig as Suzuki suggested earlier and make ETM{3,4}x as >> > the initial users. Someone more familiar with Intel PTs can then make >> > use of this kconfig. >> >> Instead of adding the support for individual drivers, you could handle >> this in the >> generic perf layer. e.g, Fail perf_event create with an attribute >> which allows >> kernel tracing ? >> >> if (!attr.exclude_kernel) >> return -EINVAL; >> >> Or even exclude the kernel silently always. >> >> This could also be limited to PMUs with PERF_PMU_CAP_ITRACE, if you >> want to >> limit this to PMUs that instruction level tracing. > > The sysfs interface to ETM also needs to deny access to kernel trace, > so it's > safest to enforce it in the drivers in addition to any enforcement done > in perf. > Yes, it will be done in drivers for sysfs interface as well based on the same kconfig. > Also, forcing exclude_kernel on all perf events may be too strong. > Including > the kernel in counted events e.g. cache misses can help understand the > effect > of system calls on performance, and isn't a big side channel compared > to > userspace event counts. It doesn't reveal detailed timings in the way > trace does. > > So there's an argument for locking out kernel trace specifically (ETM > or PT > on the kernel); or even, for locking out timed trace with timestamps > and > cycle counts, and allowing untimed trace. So, that could be done in > perf, with > a more specific test on the type of event, before it forced > exclude_kernel. > Yes exclude_kernel for all events might not be possible, so it would be better if it is initially applied for PMUs with PERF_PMU_CAP_ITRACE as Suzuki suggested. Thanks, Sai -- QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation