Skip to content

Instantly share code, notes, and snippets.

@bhurlow
Last active March 2, 2024 23:17
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save bhurlow/2d5c11811c9ec89fff374d29e850e000 to your computer and use it in GitHub Desktop.
Save bhurlow/2d5c11811c9ec89fff374d29e850e000 to your computer and use it in GitHub Desktop.
lscpu from CI
Architecture: aarch64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
CPU(s): 16
On-line CPU(s) list: 0-15
Vendor ID: ARM
Model name: Neoverse-V1
Model: 1
Thread(s) per core: 1
Core(s) per cluster: 16
Socket(s): -
Cluster(s): 1
Stepping: r1p1
BogoMIPS: 2100.00
Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm jscvt fcma lrcpc dcpop sha3 sm3 sm4 asimddp sha512 sve asimdfhm dit uscat ilrcpc flagm ssbs paca pacg dcpodp svei8mm svebf16 i8mm bf16 dgh rng
L1d cache: 1 MiB (16 instances)
L1i cache: 1 MiB (16 instances)
L2 cache: 16 MiB (16 instances)
L3 cache: 32 MiB (1 instance)
NUMA node(s): 1
NUMA node0 CPU(s): 0-15
Vulnerability Gather data sampling: Not affected
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Mmio stale data: Not affected
Vulnerability Retbleed: Not affected
Vulnerability Spec rstack overflow: Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
Vulnerability Spectre v1: Mitigation; __user pointer sanitization
Vulnerability Spectre v2: Mitigation; CSV2, BHB
Vulnerability Srbds: Not affected
Vulnerability Tsx async abort: Not affected
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Address sizes: 48 bits physical, 48 bits virtual
Byte Order: Little Endian
CPU(s): 4
On-line CPU(s) list: 0-3
Vendor ID: AuthenticAMD
Model name: AMD Ryzen 5 3600 6-Core Processor
CPU family: 23
Model: 113
Thread(s) per core: 1
Core(s) per socket: 1
Socket(s): 4
Stepping: 0
BogoMIPS: 7200.00
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm rep_good nopl cpuid extd_apicid tsc_known_
freq pni pclmulqdq ssse3 fma cx16 sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm cmp_legacy svm cr8_legacy abm sse4a misalignsse 3dnow
prefetch osvw perfctr_core ssbd ibpb stibp vmmcall fsgsbase tsc_adjust bmi1 avx2 smep bmi2 rdseed adx smap clflushopt clwb sha_ni xsaveopt xsavec xgetbv1 clzero xsaveerptr wbnoinvd arat
npt lbrv nrip_save tsc_scale vmcb_clean pausefilter pfthreshold v_vmsave_vmload vgif umip rdpid arch_capabilities
Virtualization features:
Virtualization: AMD-V
Hypervisor vendor: KVM
Virtualization type: full
Caches (sum of all):
L1d: 256 KiB (4 instances)
L1i: 256 KiB (4 instances)
L2: 2 MiB (4 instances)
L3: 64 MiB (4 instances)
NUMA:
NUMA node(s): 1
NUMA node0 CPU(s): 0-3
Vulnerabilities:
Gather data sampling: Not affected
Itlb multihit: Not affected
L1tf: Not affected
Mds: Not affected
Meltdown: Not affected
Mmio stale data: Not affected
Retbleed: Mitigation; untrained return thunk; SMT disabled
Spec rstack overflow: Mitigation; SMT disabled
Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Spectre v2: Mitigation; Retpolines, IBPB conditional, STIBP disabled, RSB filling, PBRSB-eIBRS Not affected
Srbds: Not affected
Tsx async abort: Not affected
+cpuinfo | --> RUN lscpu
+cpuinfo | Architecture: x86_64
+cpuinfo | CPU op-mode(s): 32-bit, 64-bit
+cpuinfo | Address sizes: 46 bits physical, 48 bits virtual
+cpuinfo | Byte Order: Little Endian
+cpuinfo | CPU(s): 2
+cpuinfo | On-line CPU(s) list: 0,1
+cpuinfo | Vendor ID: GenuineIntel
+cpuinfo | Model name: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz
+cpuinfo | CPU family: 6
+cpuinfo | Model: 85
+cpuinfo | Thread(s) per core: 2
+cpuinfo | Core(s) per socket: 1
+cpuinfo | Socket(s): 1
+cpuinfo | Stepping: 7
+cpuinfo | BogoMIPS: 4999.99
+cpuinfo | Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ss ht syscall nx pdpe1gb rdtscp lm constant_tsc rep_good nopl xtopology nonstop_tsc cpuid tsc_known_freq pni pclmulqdq ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm abm 3dnowprefetch invpcid_single pti fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid mpx avx512f avx512dq rdseed adx smap clflushopt clwb avx512cd avx512bw avx512vl xsaveopt xsavec xgetbv1 xsaves ida arat pku ospke
+cpuinfo | Hypervisor vendor: KVM
+cpuinfo | Virtualization type: full
+cpuinfo | L1d cache: 32 KiB (1 instance)
+cpuinfo | L1i cache: 32 KiB (1 instance)
+cpuinfo | L2 cache: 1 MiB (1 instance)
+cpuinfo | L3 cache: 35.8 MiB (1 instance)
+cpuinfo | NUMA node(s): 1
+cpuinfo | NUMA node0 CPU(s): 0,1
+cpuinfo | Vulnerability Gather data sampling: Unknown: Dependent on hypervisor status
+cpuinfo | Vulnerability Itlb multihit: KVM: Mitigation: VMX unsupported
+cpuinfo | Vulnerability L1tf: Mitigation; PTE Inversion
+cpuinfo | Vulnerability Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
+cpuinfo | Vulnerability Meltdown: Mitigation; PTI
+cpuinfo | Vulnerability Mmio stale data: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
+cpuinfo | Vulnerability Retbleed: Vulnerable
+cpuinfo | Vulnerability Spec rstack overflow: Not affected
+cpuinfo | Vulnerability Spec store bypass: Vulnerable
+cpuinfo | Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
+cpuinfo | Vulnerability Spectre v2: Mitigation; Retpolines, STIBP disabled, RSB filling, PBRSB-eIBRS Not affected
+cpuinfo | Vulnerability Srbds: Not affected
+cpuinfo | Vulnerability Tsx async abort: Not affected
output | --> exporting outputs
+cpuinfo | --> FROM +base
debian:bookworm-slim | --> Load metadata debian:bookworm-slim linux/amd64
+cpuinfo | --> RUN lscpu
+cpuinfo | Architecture: x86_64
+cpuinfo | CPU op-mode(s): 32-bit, 64-bit
+cpuinfo | Address sizes: 46 bits physical, 48 bits virtual
+cpuinfo | Byte Order: Little Endian
+cpuinfo | CPU(s): 8
+cpuinfo | On-line CPU(s) list: 0-7
+cpuinfo | Vendor ID: GenuineIntel
+cpuinfo | Model name: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz
+cpuinfo | CPU family: 6
+cpuinfo | Model: 85
+cpuinfo | Thread(s) per core: 2
+cpuinfo | Core(s) per socket: 4
+cpuinfo | Socket(s): 1
+cpuinfo | Stepping: 7
+cpuinfo | BogoMIPS: 4999.98
+cpuinfo | Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ss ht syscall nx pdpe1gb rdtscp lm constant_tsc rep_good nopl xtopology nonstop_tsc cpuid tsc_known_freq pni pclmulqdq ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm abm 3dnowprefetch invpcid_single pti fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid mpx avx512f avx512dq rdseed adx smap clflushopt clwb avx512cd avx512bw avx512vl xsaveopt xsavec xgetbv1 xsaves ida arat pku ospke
+cpuinfo | Hypervisor vendor: KVM
+cpuinfo | Virtualization type: full
+cpuinfo | L1d cache: 128 KiB (4 instances)
+cpuinfo | L1i cache: 128 KiB (4 instances)
+cpuinfo | L2 cache: 4 MiB (4 instances)
+cpuinfo | L3 cache: 35.8 MiB (1 instance)
+cpuinfo | NUMA node(s): 1
+cpuinfo | NUMA node0 CPU(s): 0-7
+cpuinfo | Vulnerability Gather data sampling: Unknown: Dependent on hypervisor status
+cpuinfo | Vulnerability Itlb multihit: KVM: Mitigation: VMX unsupported
+cpuinfo | Vulnerability L1tf: Mitigation; PTE Inversion
+cpuinfo | Vulnerability Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
+cpuinfo | Vulnerability Meltdown: Mitigation; PTI
+cpuinfo | Vulnerability Mmio stale data: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
+cpuinfo | Vulnerability Retbleed: Vulnerable
+cpuinfo | Vulnerability Spec rstack overflow: Not affected
+cpuinfo | Vulnerability Spec store bypass: Vulnerable
+cpuinfo | Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
+cpuinfo | Vulnerability Spectre v2: Mitigation; Retpolines, STIBP disabled, RSB filling, PBRSB-eIBRS Not affected
+cpuinfo | Vulnerability Srbds: Not affected
+cpuinfo | Vulnerability Tsx async abort: Not affected
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment