mirror of
https://github.com/kubernetes-sigs/node-feature-discovery.git
synced 2025-03-28 18:57:10 +00:00
Merge pull request #1149 from ArangoGutierrez/sev_capacity
cpu: expose the total number of AMD SEV ASID and ES
This commit is contained in:
commit
b0c52fe28f
3 changed files with 20 additions and 4 deletions
|
@ -58,9 +58,11 @@ option of nfd-worker.
|
|||
| **`cpu-security.sgx.enabled`** | true | Set to 'true' if Intel SGX is enabled in BIOS (based on a non-zero sum value of SGX EPC section sizes).
|
||||
| **`cpu-security.se.enabled`** | true | Set to 'true' if IBM Secure Execution for Linux (IBM Z & LinuxONE) is available and enabled (requires `/sys/firmware/uv/prot_virt_host` facility)
|
||||
| **`cpu-security.tdx.enabled`** | true | Set to 'true' if Intel TDX is available on the host and has been enabled (requires `/sys/module/kvm_intel/parameters/tdx`).
|
||||
| **`cpu-security.sev.enabled`** | true | Set to 'true' if ADM SEV is available on the host and has been enabled (requires `/sys/module/kvm_intel/parameters/sev`).
|
||||
| **`cpu-security.sev.es.enabled`** | true | Set to 'true' if ADM SEV-ES is available on the host and has been enabled (requires `/sys/module/kvm_intel/parameters/sev_es`).
|
||||
| **`cpu-security.sev.snp.enabled`**| true | Set to 'true' if ADM SEV-SNP is available on the host and has been enabled (requires `/sys/module/kvm_intel/parameters/sev_snp`).
|
||||
| **`cpu-security.sev.enabled`** | true | Set to 'true' if ADM SEV is available on the host and has been enabled (requires `/sys/module/kvm_amd/parameters/sev`).
|
||||
| **`cpu-security.sev.es.enabled`** | true | Set to 'true' if ADM SEV-ES is available on the host and has been enabled (requires `/sys/module/kvm_amd/parameters/sev_es`).
|
||||
| **`cpu-security.sev.snp.enabled`**| true | Set to 'true' if ADM SEV-SNP is available on the host and has been enabled (requires `/sys/module/kvm_amd/parameters/sev_snp`).
|
||||
| **`cpu-security.sex.asids`** | int | The total amount of AMD SEV address-space identifiers (ASIDs), based on the `/sys/fs/cgroup/misc.capacity` information.
|
||||
| **`cpu-security.sex.encrypted_state_ids`** | int | The total amount of AMD SEV-ES and SEV-SNP supported, based on the `/sys/fs/cgroup/misc.capacity` information.
|
||||
| **`cpu-sgx.enabled`** | true | **DEPRECATED**: use **`cpu-security.sgx.enabled`** instead.
|
||||
| **`cpu-se.enabled`** | true | **DEPRECATED**: use **`cpu-security.se.enabled`** instead.
|
||||
| **`cpu-model.vendor_id`** | string | Comparable CPU vendor ID.
|
||||
|
|
|
@ -176,7 +176,11 @@ func (s *cpuSource) GetLabels() (source.FeatureLabels, error) {
|
|||
// Security
|
||||
// skipLabel lists features that will not have labels created but are only made available for
|
||||
// NodeFeatureRules (e.g. to be published via extended resources instead)
|
||||
skipLabel := sets.NewString("tdx.total_keys", "sgx.epc")
|
||||
skipLabel := sets.NewString(
|
||||
"tdx.total_keys",
|
||||
"sgx.epc",
|
||||
"sev.encrypted_state_ids",
|
||||
"sev.asids")
|
||||
for k, v := range features.Attributes[SecurityFeature].Elements {
|
||||
if !skipLabel.Has(k) {
|
||||
labels["security."+k] = v
|
||||
|
|
|
@ -55,10 +55,20 @@ func discoverSecurity() map[string]string {
|
|||
|
||||
if sevParameterEnabled("sev") {
|
||||
elems["sev.enabled"] = "true"
|
||||
|
||||
sevAddressSpaceIdentifiers := getCgroupMiscCapacity("sev")
|
||||
if sevAddressSpaceIdentifiers > -1 {
|
||||
elems["sev.asids"] = strconv.FormatInt(int64(sevAddressSpaceIdentifiers), 10)
|
||||
}
|
||||
}
|
||||
|
||||
if sevParameterEnabled("sev_es") {
|
||||
elems["sev.es.enabled"] = "true"
|
||||
|
||||
sevEncryptedStateIDs := getCgroupMiscCapacity("sev_es")
|
||||
if sevEncryptedStateIDs > -1 {
|
||||
elems["sev.encrypted_state_ids"] = strconv.FormatInt(int64(sevEncryptedStateIDs), 10)
|
||||
}
|
||||
}
|
||||
|
||||
if sevParameterEnabled("sev_snp") {
|
||||
|
|
Loading…
Add table
Reference in a new issue