[Eisfair] Umfrage: Ausgabe von lscpu auf virtualisierten eisfair-Servern
Armin Weinmann
news at die-weinmanns.de
So Mär 22 20:20:50 CET 2020
Am 22.03.2020 um 14:50 schrieb Thomas Bork:
> Am 22.03.2020 um 14:37 schrieb Marcus Röckrath:
>
>> lscpu
>> von virtualisierten System, aber auch nur von denen!
>
> Und dazu bitte noch die Ausgabe von
>
> lscpu | grep 'Hypervisor vendor:' | egrep -i
> 'bochs|kvm|microsoft|qemu|virtualbox|vmware|xen'
> inxi -b
>
System 1 auf VMWare:
# lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
Address sizes: 43 bits physical, 48 bits virtual
CPU(s): 2
On-line CPU(s) list: 0,1
Thread(s) per core: 1
Core(s) per socket: 1
Socket(s): 2
NUMA node(s): 1
Vendor ID: GenuineIntel
CPU family: 6
Model: 63
Model name: Intel(R) Xeon(R) CPU E5-2650 v3 @ 2.30GHz
Stepping: 2
CPU MHz: 2299.247
BogoMIPS: 4599.99
Hypervisor vendor: VMware
Virtualization type: full
L1d cache: 64 KiB
L1i cache: 64 KiB
L2 cache: 512 KiB
L3 cache: 50 MiB
NUMA node0 CPU(s): 0,1
Vulnerability Itlb multihit: KVM: Vulnerable
Vulnerability L1tf: Mitigation; PTE Inversion
Vulnerability Mds: Mitigation; Clear CPU buffers; SMT Host
state unknown
Vulnerability Meltdown: Mitigation; PTI
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass
disabled via prctl and seccomp
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers
and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Full generic retpoline,
IBPB conditional, IBRS_FW, STIBP disabled, RSB filling
Vulnerability Tsx async abort: Not affected
Flags: fpu vme de pse tsc msr pae mce cx8 apic
sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ss syscall nx
pdpe1gb rdts
cp lm constant_tsc arch_perfmon nopl
xtopology tsc_reliable nonstop_tsc pni pclmulqdq ssse3 fma cx16 pcid
sse4_1 sse4_2 x2ap
ic movbe popcnt tsc_deadline_timer aes
xsave avx f16c rdrand hypervisor lahf_lm abm invpcid_single ssbd ibrs
ibpb stibp kais
er fsgsbase tsc_adjust bmi1 avx2 smep
bmi2 invpcid xsaveopt arat md_clear flush_l1d arch_capabilities
# lscpu | grep 'Hypervisor vendor:' | egrep -i
'bochs|kvm|microsoft|qemu|virtualbox|vmware|xen'
Hypervisor vendor: VMware
# inxi -b
System: Host: sxvssh Kernel: 4.9.210-eisfair-64-VIRT x86_64 bits: 64
Console: tty 2 Distro: eisfair-64
Machine: Device: vmware System: VMware product: VMware Virtual
Platform serial: VMware-42 1a 81 f7 47 bd 79 41-60 5b 21 b6 a1 8b 02 f8
Mobo: Intel model: 440BX Desktop Reference Platform serial: N/A
BIOS: Phoenix v: 6.00 date: 12/12/2018
CPU(s): 2 Single core Intel Xeon E5-2650 v3s (-MT-SMP-)
speed: 2299 MHz (max)
Graphics: Card: VMware SVGA II Adapter
Display Server: N/A driver: N/A
tty size: 157x49 Advanced Data: N/A for root out of X
Network: Card: VMware VMXNET3 Ethernet Controller driver: vmxnet3
Drives: HDD Total Size: 17.2GB (7.3% used)
Info: Processes: 97 Uptime: 33 days 10:00 Memory: 91.6/2006.2MB
Init: SysVinit runlevel: 2 Client: Shell (bash) inxi: 2.3.56
System 2 auf QNAP TS-473 :
# lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
Address sizes: 40 bits physical, 48 bits virtual
CPU(s): 2
On-line CPU(s) list: 0,1
Thread(s) per core: 1
Core(s) per socket: 2
Socket(s): 1
NUMA node(s): 1
Vendor ID: AuthenticAMD
CPU family: 21
Model: 96
Model name: AMD Embedded R-Series RX-421ND
Stepping: 1
CPU MHz: 2096.066
BogoMIPS: 4192.13
Hypervisor vendor: KVM
Virtualization type: full
L1d cache: 64 KiB
L1i cache: 128 KiB
L2 cache: 2 MiB
NUMA node0 CPU(s): 0,1
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass
disabled via prctl and seccomp
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers
and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Full generic retpoline,
STIBP disabled, RSB filling
Vulnerability Tsx async abort: Not affected
Flags: fpu vme de pse tsc msr pae mce cx8 apic
sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx
mmxext fxsr_o
pt pdpe1gb lm rep_good nopl
extd_apicid pni pclmulqdq ssse3 fma cx16 sse4_1 sse4_2 x2apic movbe
popcnt tsc_deadline_timer aes
xsave avx f16c rdrand hypervisor
lahf_lm cmp_legacy cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw
xop fma4 tbm ssbd vm
mcall fsgsbase tsc_adjust bmi1 avx2
smep bmi2 xsaveopt arat
# lscpu | grep 'Hypervisor vendor:' | egrep -i
'bochs|kvm|microsoft|qemu|virtualbox|vmware|xen'
Hypervisor vendor: KVM
# inxi -b
System: Host: aweis2 Kernel: 4.9.210-eisfair-64-VIRT x86_64 bits: 64
Console: tty 0 Distro: eisfair-64
Machine: Device: qemu-or-kvm Mobo: QEMU model: Standard PC (i440FX +
PIIX 1996) v: pc-i440fx-2.3 serial: N/A
BIOS: N/A v: N/A date: N/A
CPU: Dual core AMD Embedded R-Series RX-421ND (-MCP-)
speed: 2096 MHz (max)
Graphics: Card: Device 1234:1111
Display Server: N/A driver: N/A
tty size: 158x42 Advanced Data: N/A for root out of X
Network: Card: Red Hat Virtio network device driver: virtio-pci
Drives: HDD Total Size: 53.7GB (1.4% used)
Info: Processes: 101 Uptime: 0:03 Memory: 48.3/2006.2MB
Init: SysVinit runlevel: 2 Client: Shell (bash) inxi: 2.3.56
Mehr Informationen über die Mailingliste Eisfair