lscpu - QEMU HDD
Architektur: x86_64
CPU Operationsmodus: 32-bit, 64-bit
Adressgrößen: 40 bits physical, 48 bits virtual
Byte-Reihenfolge: Little Endian
CPU(s): 4
Liste der Online-CPU(s): 0-3
Anbieterkennung: GenuineIntel
Modellname: Intel(R) Xeon(R) CPU E5-2630 v4 @ 2.20GHz
Prozessorfamilie: 6
Modell: 79
Thread(s) pro Kern: 1
Kern(e) pro Sockel: 4
Sockel: 1
Stepping: 1
BogoMIPS: 4399.99
Markierungen: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ss ht syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmon rep_good nopl xtopology cpuid tsc_known_freq pni pclmulqdq ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm abm 3dnowprefetch cpuid_fault invpcid_single pti ssbd ibrs ibpb fsgsbase tsc_adjust bmi1 hle avx2 smep bmi2 erms invpcid rtm rdseed adx smap xsaveopt arat umip
Hypervisor-Anbieter: KVM
Virtualisierungstyp: voll
L1d Cache: 128 KiB (4 Instanzen)
L1i Cache: 128 KiB (4 Instanzen)
L2 Cache: 16 MiB (4 Instanzen)
L3 Cache: 16 MiB (1 Instanz)
NUMA-Knoten: 1
NUMA-Knoten0 CPU(s): 0-3
Schwachstelle Itlb multihit: KVM: Mitigation: VMX unsupported
Schwachstelle L1tf: Mitigation; PTE Inversion
Schwachstelle Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
Schwachstelle Meltdown: Mitigation; PTI
Schwachstelle Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Schwachstelle Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Schwachstelle Spectre v2: Mitigation; Full generic retpoline, IBPB conditional, IBRS_FW, STIBP disabled, RSB filling
Schwachstelle Srbds: Not affected
Schwachstelle Tsx async abort: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown