[PATCH v2 0/8] makedumpfile: makedumpfile enhancement to filter out kernel data from vmcore
Reinhard Buendgen
BUENDGEN at de.ibm.com
Thu May 26 07:15:14 EDT 2011
Vivek,
I/O is not restricted to disk I/O (it may be network I/O, data sent to
crtypto cards etc.) and it is not always direct, Device drivers may have
buffers to which such data is copied.
So it is more than just keys, and it may change over time.
I do not think hardwiring a filter in makedumpfile is a good idea because
you would need a new makedumpfile release for every Distribution
(release).
Allowing to configure makedumpfile allows each distribution and each
platform to provide appropriate filters.
Mit freundlichen Grüßen/Best Regards/Cordialement
Reinhard
Dr. Reinhard Bündgen
RAS & Crypto Architect for Linux on System z
Virtualization and Systems Management
Mail:buendgen at de.ibm.com
Phone: ++49-(0)7031-16-1130
Fax: ++49-(0)7031-16-3456
IBM Deutschland Research & Development GmbH
Vorsitzender des Aufsichtsrats: Martin Jetter
Geschäftsführung: Dirk Wittkopp
Sitz der Gesellschaft: Böblingen
Registergericht: Amtsgericht Stuttgart, HRB 243294
From: Vivek Goyal <vgoyal at redhat.com>
To: Reinhard Buendgen/Germany/IBM at IBMDE
Cc: Dave Anderson <anderson at redhat.com>, Ananth N Mavinakayanahalli
<ananth at in.ibm.com>, kexec at lists.infradead.org, Mahesh J Salgaonkar
<mahesh at linux.vnet.ibm.com>, "Ken'ichi Ohmichi"
<oomichi at mxs.nes.nec.co.jp>, V Srivatsa <vsrivatsa at in.ibm.com>
Date: 25.05.2011 21:53
Subject: Re: [PATCH v2 0/8] makedumpfile: makedumpfile enhancement
to filter out kernel data from vmcore
On Wed, May 25, 2011 at 10:41:55AM +0200, Reinhard Buendgen wrote:
> Hi,
>
> to answer Vivek questions first: Eventually we want to be able to erase
> all data that a customer may consider sensitive to her privacy. In
> addition to encryption key that may be the contents (i.e. payload
within)
> of all kinds of I/O buffers. Consider you are running a kvm based
> hypervisor and want its dump to be analyized while promising your
> customers whose guests you run on that hypervisor that none of their
data
> will be externalized. Or consider your system reads a spreadsheat with
> bank account or health information. You might not want to send fractions
> of that information sitting in some buffers to a service organization.
So for direct IO, buffer is still in user space and should be filtered
out when we filter out user space pages using mkdumpfile. For kvm, I am
assuming that all the pages belong to qemu process and once we are
filtering out user space pages, any data belonging to guest will go away.
So atleast for above examples it does not sound as if we need symbol
erase infrastructure.
>
> to answer Daves concern: there is no intention that crash should ever
look
> into the erased structures. In theroy it should not be needed because
the
> contents of structures to be deleted should be irrelevant to kernel
> debugging.
So what are those kernel structures which we are planning to delete and
are irrelevant to kernel debugging by crash?
I think we are missing something here. If there are only few known
structures we want to get rid of, lets hardcode it in makedumpfile
instead of giving user a generic infrastructure. That way we know
that we are not leaking information at the same time making sure
that analysis tools are working.
Thanks
Vivek
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.infradead.org/pipermail/kexec/attachments/20110526/f8451157/attachment-0001.html>
More information about the kexec
mailing list