(root)/
util-linux-2.39/
tests/
expected/
lscpu/
lscpu-x86_64-64cpu-linux6.2
CPU op‐mode(s): 32‐bit, 64‐bit Address sizes:
39 bits physical, 48 bits virtual Byte Order:
Little Endian CPU(s): 8 On‐line CPU(s)
list: 0‐7 Vendor ID: GenuineIn‐
tel Model name: 11th Gen Intel(R) Core(TM)
i7‐1165G7 @ 2.80GHz CPU family: 6 Model:
140 Thread(s) per core: 2 Core(s) per socket:
4 Socket(s): 1 Stepping:
1 CPU(s) scaling MHz: 45% CPU max MHz:
4700.0000 CPU min MHz: 400.0000 BogoMIPS:
5608.00 Flags: fpu vme de pse tsc msr
pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi
mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm con‐
stant_tsc art arch_perfmon pebs bts rep_good nopl xtopology non‐
stop_tsc cpuid aperfmperf tsc_known_freq pni pclmulqdq dtes64
monitor ds_cpl vmx est tm2 ssse3 sdbg fma cx16 xtpr pdcm pcid
sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave
avx f16c rdrand lahf_lm abm 3dnowprefetch cpuid_fault epb cat_l2
invpcid_single cdp_l2 ssbd ibrs ibpb stibp ibrs_enhanced
tpr_shadow vnmi flexpriority ept vpid ept_ad fsgsbase tsc_adjust
bmi1 avx2 smep bmi2 erms invpcid rdt_a avx512f avx512dq rdseed
adx smap avx512ifma clflushopt clwb intel_pt avx512cd sha_ni
avx512bw avx512vl xsaveopt xsavec xgetbv1 xsaves split_lock_de‐
tect dtherm ida arat pln pts hwp hwp_notify hwp_act_window
hwp_epp hwp_pkg_req avx512vbmi umip pku ospke avx512_vbmi2 gfni
vaes vpclmulqdq avx512_vnni avx512_bitalg avx512_vpopcntdq rdpid
movdiri movdir64b fsrm avx512_vp2intersect md_clear ibt flush_l1d
arch_capabilities Virtualization: VT‐x L1d
cache: 192 KiB (4 instances) L1i cache:
128 KiB (4 instances) L2 cache: 5 MiB (4
instances) L3 cache: 12 MiB (1 instance)
NUMA node(s): 1 NUMA node0 CPU(s):
0‐7 Vulnerability Itlb multihit: Not affected Vulnerability
L1tf: Not affected Vulnerability Mds:
Not affected Vulnerability Meltdown: Not affected Vul‐
nerability Mmio stale data: Not affected Vulnerability Ret‐
bleed: Not affected Vulnerability Spec store bypass:
Mitigation; Speculative Store Bypass disabled via prctl Vulnera‐
bility Spectre v1: Mitigation; usercopy/swapgs barriers
and __user pointer sanitization Vulnerability Spectre v2:
Mitigation; Enhanced IBRS, IBPB conditional, RSB filling, PBRSB‐
eIBRS SW sequence Vulnerability Srbds: Not affected
Vulnerability Tsx async abort: Not affected

# The following is the parsable format, which can be fed to other
# programs. Each different item in every column has an unique ID
# starting usually from zero. #
CPU,Core,Socket,Node,,L1d,L1i,L2,L3 0,0,0,0,,0,0,0,0
1,1,0,0,,1,1,1,0 2,2,0,0,,2,2,2,0 3,3,0,0,,3,3,3,0
4,0,0,0,,0,0,0,0 5,1,0,0,,1,1,1,0 6,2,0,0,,2,2,2,0
7,3,0,0,,3,3,3,0

# The following is the parsable format, which can be fed to other
# programs. Each different item in every column has an unique ID
# starting usually from zero. #
CPU,Core,Socket,Node,,L1d,L1i,L2,L3 0,0,0,0,,0,0,0,0
1,1,0,0,,1,1,1,0 2,2,0,0,,2,2,2,0 3,3,0,0,,3,3,3,0
4,0,0,0,,0,0,0,0 5,1,0,0,,1,1,1,0 6,2,0,0,,2,2,2,0
7,3,0,0,,3,3,3,0