On 03/17/10 01:21 PM, Tony MacDoodle wrote:
Hello,
I was wondering if it's possible to monitor the UltraSparc T2 Plus
security co-processors built into the CPU with DTrace. This allows the
CPU to off-load cryptographic functions to the co-processor. Can this
process be monitored and/or probed with DTrace and any associated apps
that use this function?
Off-loading to ncp/n2cp/n2rng drivers can be observed through fbt probes
in said drivers.
One level above you can activate the probes in Kernel Crypto Framework
scheduler (kcf_get_hardware_provider{,_nomech}()/kcf_get_mech_provider()
or kcf_submit_request()+CRYPTO_HW_PROVIDER).
Yet one level above you can see the ioctl() requests going from
pkcs11_kernel.so to /dev/crypto by observing crypto module entry points
(this will help you to get the userland consumer side data) like
crypto_ioctl()+CRYPTO_{ENCRYPT,DECRYPT,...}.
What exactly do you have in mind ?
v.
_______________________________________________
dtrace-discuss mailing list
dtrace-discuss@opensolaris.org