lscpu - QEMU HDD - Intel Xeon E5-2630 v4

Return To QEMU HDD - Intel Xeon E5-2630 v4 System Information

Architektur:                     x86_64
CPU Operationsmodus:             32-bit, 64-bit
Adressgrößen:                    40 bits physical, 48 bits virtual
Byte-Reihenfolge:                Little Endian
CPU(s):                          4
Liste der Online-CPU(s):         0-3
Anbieterkennung:                 GenuineIntel
Modellname:                      Intel(R) Xeon(R) CPU E5-2630 v4 @ 2.20GHz
Prozessorfamilie:                6
Modell:                          79
Thread(s) pro Kern:              1
Kern(e) pro Sockel:              4
Sockel:                          1
Stepping:                        1
BogoMIPS:                        4399.99
Markierungen:                    fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ss ht syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmon rep_good nopl xtopology cpuid tsc_known_freq pni pclmulqdq ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm abm 3dnowprefetch cpuid_fault invpcid_single pti ssbd ibrs ibpb fsgsbase tsc_adjust bmi1 hle avx2 smep bmi2 erms invpcid rtm rdseed adx smap xsaveopt arat umip
Hypervisor-Anbieter:             KVM
Virtualisierungstyp:             voll
L1d Cache:                       128 KiB (4 Instanzen)
L1i Cache:                       128 KiB (4 Instanzen)
L2 Cache:                        16 MiB (4 Instanzen)
L3 Cache:                        16 MiB (1 Instanz)
NUMA-Knoten:                     1
NUMA-Knoten0 CPU(s):             0-3
Schwachstelle Itlb multihit:     KVM: Mitigation: VMX unsupported
Schwachstelle L1tf:              Mitigation; PTE Inversion
Schwachstelle Mds:               Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
Schwachstelle Meltdown:          Mitigation; PTI
Schwachstelle Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Schwachstelle Spectre v1:        Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Schwachstelle Spectre v2:        Mitigation; Full generic retpoline, IBPB conditional, IBRS_FW, STIBP disabled, RSB filling
Schwachstelle Srbds:             Not affected
Schwachstelle Tsx async abort:   Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown

Return To QEMU HDD - Intel Xeon E5-2630 v4 System Information