lscpu - 6400

Return To 6400 System Information

架构:                           x86_64
CPU 运行模式:                   32-bit, 64-bit
Address sizes:                   43 bits physical, 48 bits virtual
字节序:                         Little Endian
CPU:                             8
在线 CPU 列表:                  0-7
厂商 ID:                        AuthenticAMD
型号名称:                       AMD Ryzen 5 2400G with Radeon Vega Graphics
CPU 系列:                       23
型号:                           17
每个核的线程数:                 2
每个座的核数:                   4
座:                             1
步进:                           0
Frequency boost:                 enabled
CPU 最大 MHz:                   3600.0000
CPU 最小 MHz:                   1600.0000
BogoMIPS:                       7186.67
标记:                           fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid aperfmperf rapl pni pclmulqdq monitor ssse3 fma cx16 sse4_1 sse4_2 movbe popcnt aes xsave avx f16c rdrand lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw skinit wdt tce topoext perfctr_core perfctr_nb bpext perfctr_llc mwaitx cpb hw_pstate ssbd ibpb vmmcall fsgsbase bmi1 avx2 smep bmi2 rdseed adx smap clflushopt sha_ni xsaveopt xsavec xgetbv1 clzero irperf xsaveerptr arat npt lbrv svm_lock nrip_save tsc_scale vmcb_clean flushbyasid decodeassists pausefilter pfthreshold avic v_vmsave_vmload vgif overflow_recov succor smca sme sev sev_es
虚拟化:                         AMD-V
L1d 缓存:                       128 KiB (4 instances)
L1i 缓存:                       256 KiB (4 instances)
L2 缓存:                        2 MiB (4 instances)
L3 缓存:                        4 MiB (1 instance)
NUMA 节点:                      1
NUMA 节点0 CPU:                 0-7
Vulnerability Itlb multihit:     Not affected
Vulnerability L1tf:              Not affected
Vulnerability Mds:               Not affected
Vulnerability Meltdown:          Not affected
Vulnerability Mmio stale data:   Not affected
Vulnerability Retbleed:          Mitigation; untrained return thunk; SMT vulnerable
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1:        Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2:        Mitigation; Retpolines, IBPB conditional, STIBP disabled, RSB filling, PBRSB-eIBRS Not affected
Vulnerability Srbds:             Not affected
Vulnerability Tsx async abort:   Not affected

Return To 6400 System Information