The ZHAOXIN KaiXian KX-U6780A is a 8 thread processor configuration with 2.7GHz clock speed. The ZHAOXIN KaiXian KX-U6780A is a "Lujiazui" processor. Some of the prominent capabilities of the processor include SSE 4.2 + AVX + AES + Intel VT-x + RdRand + FSGSBASE + BMI2. This processor has been found on OpenBenchmarking.org since Q3'2019 and found in approximately 341 results on OpenBenchmarking.org.
processor : 0 vendor_id : CentaurHauls cpu family : 7 model : 59 model name : ZHAOXIN KaiXian KX-U6780A@2.7GHz stepping : 1 cpu MHz : 1200.000 cache size : 4096 KB physical id : 0 siblings : 8 core id : 0 cpu cores : 8 apicid : 0 initial apicid : 0 fpu : yes fpu_exception : yes cpuid level : 13 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmon rep_good nopl nonstop_tsc cpuid pni pclmulqdq monitor vmx smx est tm2 ssse3 cx16 xtpr pcid sse4_1 sse4_2 movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand rng rng_en ace ace_en ace2 phe phe_en pmm pmm_en lahf_lm abm 3dnowprefetch invpcid_single ibrs ibpb tpr_shadow vnmi ept vpid fsgsbase tsc_adjust bmi1 smep bmi2 invpcid rdseed adx sha_ni xsaveopt dtherm ida umip arch_capabilities vmx flags : vnmi invvpid ept_x_only ept_1gb tsc_offset vtpr mtf ept vpid unrestricted_guest ple bugs : spectre_v1 spec_store_bypass mds itlb_multihit bogomips : 5389.41 clflush size : 64 cache_alignment : 64 address sizes : 40 bits physical, 48 bits virtual power management:
架构: x86_64 CPU 运行模式: 32-bit, 64-bit 字节序: Little Endian Address sizes: 40 bits physical, 48 bits virtual CPU: 8 在线 CPU 列表: 0-7 每个核的线程数: 1 每个座的核数: 8 座: 1 NUMA 节点: 1 厂商 ID: CentaurHauls CPU 系列: 7 型号: 59 型号名称: ZHAOXIN KaiXian KX-U6780A@2.7GHz 步进: 1 Frequency boost: disabled CPU MHz: 1200.000 CPU 最大 MHz: 2700.0000 CPU 最小 MHz: 1200.0000 BogoMIPS: 5389.41 虚拟化: VT-x L1d 缓存: 256 KiB L1i 缓存: 256 KiB L2 缓存: 8 MiB NUMA 节点0 CPU: 0-7 Vulnerability Itlb multihit: KVM: Mitigation: VMX disabled Vulnerability L1tf: Not affected Vulnerability Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled Vulnerability Meltdown: Not affected Vulnerability Spec store bypass: Vulnerable Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization Vulnerability Spectre v2: Not affected Vulnerability Srbds: Not affected Vulnerability Tsx async abort: Not affected 标记: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmon rep_good nopl nonstop_tsc cpuid pni pclmulqdq monitor vmx smx est tm2 ssse3 cx16 xtpr pcid sse4_1 sse4_2 movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand rng rng_en ace ace_en ace2 phe phe_en pmm pmm_en lahf_lm abm 3dnowprefetch invpcid_single ibrs ibpb tpr_shadow vnmi ept vpid fsgsbase tsc_adjust bmi1 smep bmi2 invpcid rdseed adx sha_ni xsaveopt dtherm ida umip arch_capabilities