[Eisfair] Umfrage: Ausgabe von lscpu auf virtualisierten eisfair-Servern
Rolf Bensch
azubi at bensch-net.de
So Mär 22 15:34:52 CET 2020
Am 22.03.20 um 14:37 schrieb Marcus Röckrath:
> Hallo,
>
> wir benötigen dringend die Ausgabe von
>
> lscpu
Welcome to eisfair!
base : 2.8.25
eiskernel: 4.9.210-eisfair-64-VIRT
eis64 # lscpu | grep 'Hypervisor vendor:' | egrep -i
'bochs|kvm|microsoft|qemu|virtualbox|vmware|xen'
Hypervisor vendor: KVM
eis64 # inxi -b
System: Host: eis64 Kernel: 4.9.210-eisfair-64-VIRT x86_64 bits: 64
Console: tty 0 Distro: eisfair-64
Machine: Device: kvm System: QEMU product: Standard PC (i440FX + PIIX
1996) v: pc-i440fx-xenial serial: N/A
Mobo: N/A model: N/A serial: N/A
BIOS: SeaBIOS v: Ubuntu-1.8.2-1ubuntu1 date: 04/01/2014
CPU(s): 2 Single core QEMU Virtual version 2.5+s (-MT-SMP-)
speed: 3192 MHz (max)
Graphics: Card: Cirrus Logic GD 5446
Display Server: N/A driver: N/A
tty size: 135x47 Advanced Data: N/A for root out of X
Network: Card: Red Hat Virtio network device driver: virtio-pci
Drives: HDD Total Size: 64.4GB (2.6% used)
Info: Processes: 108 Uptime: 29 days 4:01 Memory: 180.0/1982.2MB
Init: SysVinit runlevel: 2 Client: Shell (bash) inxi: 2.3.56
eis64 # lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
Address sizes: 40 bits physical, 48 bits virtual
CPU(s): 2
On-line CPU(s) list: 0,1
Thread(s) per core: 1
Core(s) per socket: 1
Socket(s): 2
NUMA node(s): 1
Vendor ID: GenuineIntel
CPU family: 6
Model: 6
Model name: QEMU Virtual CPU version 2.5+
Stepping: 3
CPU MHz: 3192.606
BogoMIPS: 6385.21
Virtualization: VT-x
Hypervisor vendor: KVM
Virtualization type: full
L1d cache: 64 KiB
L1i cache: 64 KiB
L2 cache: 8 MiB
NUMA node0 CPU(s): 0,1
Vulnerability Itlb multihit: KVM: Mitigation: Split huge pages
Vulnerability L1tf: Mitigation; PTE Inversion; VMX
conditional cache flushes, SMT disabled
Vulnerability Mds: Vulnerable: Clear CPU buffers
attempted, no microcode; SMT Host state unknown
Vulnerability Meltdown: Mitigation; PTI
Vulnerability Spec store bypass: Vulnerable
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers
and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Full generic retpoline,
STIBP disabled, RSB filling
Vulnerability Tsx async abort: Not affected
Flags: fpu de pse tsc msr pae mce cx8 apic sep
mtrr pge mca cmov pse36 clflush mmx fxsr sse sse2 syscall nx l
m rep_good nopl pni vmx cx16 x2apic
hypervisor lahf_lm kaiser tpr_shadow vnmi flexpriority ept vpid
Hope it helps...
Rolf
Mehr Informationen über die Mailingliste Eisfair