Skip to content

Instantly share code, notes, and snippets.

@woachk
Created January 23, 2025 19:31
Show Gist options
  • Save woachk/1f2faac5d18d0039a8cf724e75fa6567 to your computer and use it in GitHub Desktop.
Save woachk/1f2faac5d18d0039a8cf724e75fa6567 to your computer and use it in GitHub Desktop.
Architecture: aarch64
CPU op-mode(s): 64-bit
Byte Order: Little Endian
CPU(s): 8
On-line CPU(s) list: 0-7
Vendor ID: ARM
Model name: Cortex-A720
Model: 1
Thread(s) per core: 1
Core(s) per socket: 4
Socket(s): 1
Stepping: r0p1
CPU(s) scaling MHz: 42%
CPU max MHz: 2400.0000
CPU min MHz: 339.0000
BogoMIPS: 26.00
Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm jscvt fcma lrcpc dcpop sha3 sm3 sm4 asimddp sha512 sve asimdfhm dit uscat ilrcpc flagm ssbs sb paca pacg dcpodp sve2 sveaes svepmull svebitperm svesha3 svesm4 flagm2 frint svei8mm svebf16 i8mm bf16 dgh bti ecv afp wfxt
Model name: Cortex-X4
Model: 1
Thread(s) per core: 1
Core(s) per socket: 3
Socket(s): 1
Stepping: r0p1
CPU(s) scaling MHz: 76%
CPU max MHz: 3300.0000
CPU min MHz: 622.0000
BogoMIPS: 26.00
Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm jscvt fcma lrcpc dcpop sha3 sm3 sm4 asimddp sha512 sve asimdfhm dit uscat ilrcpc flagm ssbs sb paca pacg dcpodp sve2 sveaes svepmull svebitperm svesha3 svesm4 flagm2 frint svei8mm svebf16 i8mm bf16 dgh bti ecv afp wfxt
Model name: -
Model: 1
Thread(s) per core: 1
Core(s) per socket: 1
Socket(s): 1
CPU(s) scaling MHz: 63%
CPU max MHz: 3626.0000
CPU min MHz: 798.0000
Vulnerability Gather data sampling: Not affected
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Mmio stale data: Not affected
Vulnerability Reg file data sampling: Not affected
Vulnerability Retbleed: Not affected
Vulnerability Spec rstack overflow: Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
Vulnerability Spectre v1: Mitigation; __user pointer sanitization
Vulnerability Spectre v2: Not affected
Vulnerability Srbds: Not affected
Vulnerability Tsx async abort: Not affected
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment