On 03/17/10 01:21 PM, Tony MacDoodle wrote:
Hello,

I was wondering if it's possible to monitor the UltraSparc T2 Plus
security co-processors built into the CPU with DTrace. This allows the
CPU to off-load cryptographic functions to the co-processor. Can this
process be monitored and/or probed with DTrace and any associated apps
that use this function?

Off-loading to ncp/n2cp/n2rng drivers can be observed through fbt probes in said drivers.

One level above you can activate the probes in Kernel Crypto Framework scheduler (kcf_get_hardware_provider{,_nomech}()/kcf_get_mech_provider() or kcf_submit_request()+CRYPTO_HW_PROVIDER).

Yet one level above you can see the ioctl() requests going from pkcs11_kernel.so to /dev/crypto by observing crypto module entry points (this will help you to get the userland consumer side data) like crypto_ioctl()+CRYPTO_{ENCRYPT,DECRYPT,...}.

What exactly do you have in mind ?


v.
_______________________________________________
dtrace-discuss mailing list
dtrace-discuss@opensolaris.org

Reply via email to