Last active
March 2, 2024 23:17
-
-
Save bhurlow/2d5c11811c9ec89fff374d29e850e000 to your computer and use it in GitHub Desktop.
lscpu from CI
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Architecture: aarch64 | |
CPU op-mode(s): 32-bit, 64-bit | |
Byte Order: Little Endian | |
CPU(s): 16 | |
On-line CPU(s) list: 0-15 | |
Vendor ID: ARM | |
Model name: Neoverse-V1 | |
Model: 1 | |
Thread(s) per core: 1 | |
Core(s) per cluster: 16 | |
Socket(s): - | |
Cluster(s): 1 | |
Stepping: r1p1 | |
BogoMIPS: 2100.00 | |
Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm jscvt fcma lrcpc dcpop sha3 sm3 sm4 asimddp sha512 sve asimdfhm dit uscat ilrcpc flagm ssbs paca pacg dcpodp svei8mm svebf16 i8mm bf16 dgh rng | |
L1d cache: 1 MiB (16 instances) | |
L1i cache: 1 MiB (16 instances) | |
L2 cache: 16 MiB (16 instances) | |
L3 cache: 32 MiB (1 instance) | |
NUMA node(s): 1 | |
NUMA node0 CPU(s): 0-15 | |
Vulnerability Gather data sampling: Not affected | |
Vulnerability Itlb multihit: Not affected | |
Vulnerability L1tf: Not affected | |
Vulnerability Mds: Not affected | |
Vulnerability Meltdown: Not affected | |
Vulnerability Mmio stale data: Not affected | |
Vulnerability Retbleed: Not affected | |
Vulnerability Spec rstack overflow: Not affected | |
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl | |
Vulnerability Spectre v1: Mitigation; __user pointer sanitization | |
Vulnerability Spectre v2: Mitigation; CSV2, BHB | |
Vulnerability Srbds: Not affected | |
Vulnerability Tsx async abort: Not affected |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Architecture: x86_64 | |
CPU op-mode(s): 32-bit, 64-bit | |
Address sizes: 48 bits physical, 48 bits virtual | |
Byte Order: Little Endian | |
CPU(s): 4 | |
On-line CPU(s) list: 0-3 | |
Vendor ID: AuthenticAMD | |
Model name: AMD Ryzen 5 3600 6-Core Processor | |
CPU family: 23 | |
Model: 113 | |
Thread(s) per core: 1 | |
Core(s) per socket: 1 | |
Socket(s): 4 | |
Stepping: 0 | |
BogoMIPS: 7200.00 | |
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm rep_good nopl cpuid extd_apicid tsc_known_ | |
freq pni pclmulqdq ssse3 fma cx16 sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm cmp_legacy svm cr8_legacy abm sse4a misalignsse 3dnow | |
prefetch osvw perfctr_core ssbd ibpb stibp vmmcall fsgsbase tsc_adjust bmi1 avx2 smep bmi2 rdseed adx smap clflushopt clwb sha_ni xsaveopt xsavec xgetbv1 clzero xsaveerptr wbnoinvd arat | |
npt lbrv nrip_save tsc_scale vmcb_clean pausefilter pfthreshold v_vmsave_vmload vgif umip rdpid arch_capabilities | |
Virtualization features: | |
Virtualization: AMD-V | |
Hypervisor vendor: KVM | |
Virtualization type: full | |
Caches (sum of all): | |
L1d: 256 KiB (4 instances) | |
L1i: 256 KiB (4 instances) | |
L2: 2 MiB (4 instances) | |
L3: 64 MiB (4 instances) | |
NUMA: | |
NUMA node(s): 1 | |
NUMA node0 CPU(s): 0-3 | |
Vulnerabilities: | |
Gather data sampling: Not affected | |
Itlb multihit: Not affected | |
L1tf: Not affected | |
Mds: Not affected | |
Meltdown: Not affected | |
Mmio stale data: Not affected | |
Retbleed: Mitigation; untrained return thunk; SMT disabled | |
Spec rstack overflow: Mitigation; SMT disabled | |
Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp | |
Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization | |
Spectre v2: Mitigation; Retpolines, IBPB conditional, STIBP disabled, RSB filling, PBRSB-eIBRS Not affected | |
Srbds: Not affected | |
Tsx async abort: Not affected |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
+cpuinfo | --> RUN lscpu | |
+cpuinfo | Architecture: x86_64 | |
+cpuinfo | CPU op-mode(s): 32-bit, 64-bit | |
+cpuinfo | Address sizes: 46 bits physical, 48 bits virtual | |
+cpuinfo | Byte Order: Little Endian | |
+cpuinfo | CPU(s): 2 | |
+cpuinfo | On-line CPU(s) list: 0,1 | |
+cpuinfo | Vendor ID: GenuineIntel | |
+cpuinfo | Model name: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz | |
+cpuinfo | CPU family: 6 | |
+cpuinfo | Model: 85 | |
+cpuinfo | Thread(s) per core: 2 | |
+cpuinfo | Core(s) per socket: 1 | |
+cpuinfo | Socket(s): 1 | |
+cpuinfo | Stepping: 7 | |
+cpuinfo | BogoMIPS: 4999.99 | |
+cpuinfo | Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ss ht syscall nx pdpe1gb rdtscp lm constant_tsc rep_good nopl xtopology nonstop_tsc cpuid tsc_known_freq pni pclmulqdq ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm abm 3dnowprefetch invpcid_single pti fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid mpx avx512f avx512dq rdseed adx smap clflushopt clwb avx512cd avx512bw avx512vl xsaveopt xsavec xgetbv1 xsaves ida arat pku ospke | |
+cpuinfo | Hypervisor vendor: KVM | |
+cpuinfo | Virtualization type: full | |
+cpuinfo | L1d cache: 32 KiB (1 instance) | |
+cpuinfo | L1i cache: 32 KiB (1 instance) | |
+cpuinfo | L2 cache: 1 MiB (1 instance) | |
+cpuinfo | L3 cache: 35.8 MiB (1 instance) | |
+cpuinfo | NUMA node(s): 1 | |
+cpuinfo | NUMA node0 CPU(s): 0,1 | |
+cpuinfo | Vulnerability Gather data sampling: Unknown: Dependent on hypervisor status | |
+cpuinfo | Vulnerability Itlb multihit: KVM: Mitigation: VMX unsupported | |
+cpuinfo | Vulnerability L1tf: Mitigation; PTE Inversion | |
+cpuinfo | Vulnerability Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown | |
+cpuinfo | Vulnerability Meltdown: Mitigation; PTI | |
+cpuinfo | Vulnerability Mmio stale data: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown | |
+cpuinfo | Vulnerability Retbleed: Vulnerable | |
+cpuinfo | Vulnerability Spec rstack overflow: Not affected | |
+cpuinfo | Vulnerability Spec store bypass: Vulnerable | |
+cpuinfo | Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization | |
+cpuinfo | Vulnerability Spectre v2: Mitigation; Retpolines, STIBP disabled, RSB filling, PBRSB-eIBRS Not affected | |
+cpuinfo | Vulnerability Srbds: Not affected | |
+cpuinfo | Vulnerability Tsx async abort: Not affected | |
output | --> exporting outputs |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
+cpuinfo | --> FROM +base | |
debian:bookworm-slim | --> Load metadata debian:bookworm-slim linux/amd64 | |
+cpuinfo | --> RUN lscpu | |
+cpuinfo | Architecture: x86_64 | |
+cpuinfo | CPU op-mode(s): 32-bit, 64-bit | |
+cpuinfo | Address sizes: 46 bits physical, 48 bits virtual | |
+cpuinfo | Byte Order: Little Endian | |
+cpuinfo | CPU(s): 8 | |
+cpuinfo | On-line CPU(s) list: 0-7 | |
+cpuinfo | Vendor ID: GenuineIntel | |
+cpuinfo | Model name: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz | |
+cpuinfo | CPU family: 6 | |
+cpuinfo | Model: 85 | |
+cpuinfo | Thread(s) per core: 2 | |
+cpuinfo | Core(s) per socket: 4 | |
+cpuinfo | Socket(s): 1 | |
+cpuinfo | Stepping: 7 | |
+cpuinfo | BogoMIPS: 4999.98 | |
+cpuinfo | Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ss ht syscall nx pdpe1gb rdtscp lm constant_tsc rep_good nopl xtopology nonstop_tsc cpuid tsc_known_freq pni pclmulqdq ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm abm 3dnowprefetch invpcid_single pti fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid mpx avx512f avx512dq rdseed adx smap clflushopt clwb avx512cd avx512bw avx512vl xsaveopt xsavec xgetbv1 xsaves ida arat pku ospke | |
+cpuinfo | Hypervisor vendor: KVM | |
+cpuinfo | Virtualization type: full | |
+cpuinfo | L1d cache: 128 KiB (4 instances) | |
+cpuinfo | L1i cache: 128 KiB (4 instances) | |
+cpuinfo | L2 cache: 4 MiB (4 instances) | |
+cpuinfo | L3 cache: 35.8 MiB (1 instance) | |
+cpuinfo | NUMA node(s): 1 | |
+cpuinfo | NUMA node0 CPU(s): 0-7 | |
+cpuinfo | Vulnerability Gather data sampling: Unknown: Dependent on hypervisor status | |
+cpuinfo | Vulnerability Itlb multihit: KVM: Mitigation: VMX unsupported | |
+cpuinfo | Vulnerability L1tf: Mitigation; PTE Inversion | |
+cpuinfo | Vulnerability Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown | |
+cpuinfo | Vulnerability Meltdown: Mitigation; PTI | |
+cpuinfo | Vulnerability Mmio stale data: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown | |
+cpuinfo | Vulnerability Retbleed: Vulnerable | |
+cpuinfo | Vulnerability Spec rstack overflow: Not affected | |
+cpuinfo | Vulnerability Spec store bypass: Vulnerable | |
+cpuinfo | Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization | |
+cpuinfo | Vulnerability Spectre v2: Mitigation; Retpolines, STIBP disabled, RSB filling, PBRSB-eIBRS Not affected | |
+cpuinfo | Vulnerability Srbds: Not affected | |
+cpuinfo | Vulnerability Tsx async abort: Not affected |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment