On Sat, Jan 30, 2021 at 12:35:10AM +0530, Sai Prakash Ranjan wrote:
Here the idea is to protect such important information from all users including root users since root privileges does not have to mean full control over the kernel [1] and root compromise does not have to be the end of the world.
And yet, your thing lacks:
+config EXCLUDE_KERNEL_HW_ITRACE
- bool "Exclude kernel mode hardware assisted instruction tracing"
- depends on PERF_EVENTS
depends on SECURITY_LOCKDOWN
or whatever the appropriate symbol is.
- help
Exclude kernel mode instruction tracing by hardware tracing
family such as ARM Coresight ETM, Intel PT and so on.
This option allows to disable kernel mode instruction tracing
offered by hardware assisted tracing for all users(including root)
especially for production systems where only userspace tracing might
be preferred for security reasons.
Also, colour me unconvinced, pretty much all kernel level PMU usage can be employed to side-channel / infer crypto keys, why focus on ITRACE over others?