consoleprogram
CPUPRINT.EXE
for
Microsoft®
Windows® NT decodes and prints the
information gathered from the processor’s
CPUID
and XGETBV
instructions.
CPUPRINT.EXE
enumerates the processor capabilities
alias features
IBRS,
STIBP,
IBPB,
L1D_FLUSH
and
SSBD
as well as the presence of the IA32_ARCH_CAPABILITIES
and IA32_FLUSH_CMD
model specific registers,
introduced by
AMD
and
Intel
with firmware alias microcode updates to fix the vulnerabilities
CVE-2017-5715
alias Branch Target Injection,
CVE-2017-5753
alias Bounds Check Bypass,
CVE-2017-5754
alias Rogue Data Cache Load,
CVE-2018-3639
alias Speculative Store Bypass,
CVE-2018-3640
alias Rogue System Register Read,
CVE-2018-3693
alias Bounds Check Bypass Store, and
CVE-2018-3615,
CVE-2018-3620
plus
CVE-2018-3646
alias L1 Termination Fault, better known by their
nicknames
Meltdown
,
Spectre
,
Spectre-NG
and
Foreshadow
.
It also enumerates the processor capabilities alias features
PCID,
introduced 2010 in first generation Intel Core
processors with Westmere
microarchitecture, and
INVPCID,
introduced 2013 in fourth generation Intel Core
processors with Haswell
microarchitecture, both available
only in long mode
, i.e. to 64-bit operating systems, which
are necessary to reduce the performance impact of the fix for
CVE-2017-5754
alias
Meltdown
.
Note: when started in its own console
window, for example per double-click, CPUPRINT.EXE
waits for a keypress before it exits and its console
window
closes; it beeps once and flashes the title bar of its
console
window to indicate this wait state.
CPUPRINT.EEE
shows typical output for an
Intel® Atom™
processor.
CPUPRINT.LOG
and
CPUPRINT.TXT
show typical outputs for
Intel® Core™
processors.
CPUPRINT.AMD
shows typical output for an
AMD® Athlon™
processor.
CPUPRINT.ZEN
shows the output for an
AMD® Ryzen™7 2700X
processor.
CPUPRINT.ZEN2
shows the output for an
AMD® Ryzen™5 3600
processor.
CPUPRINT.EPYC
shows the output for an
AMD® EPYC™ 7713
processor.
CPUPRINT.EXC
shows the output for an
AMD® A4-9125 Radeon™ R3
processor with microcode update applied.
CPUPRINT.CFL
shows the output for an
Intel® Core™ i5-8400
Coffee Lake
processor with microcode update applied.
CPUPRINT.NEW
shows the output for an
Intel® Core™ i7-7500U
processor with microcode update applied.
CPUPRINT.ICL
shows the output for an
Intel® Core™ i5-1035G1
Ice Lake
processor with microcode update applied.
CPUPRINT.HVP
shows the output for the same processor running under
Microsoft Hyper-V, which but exhibits significant
differences to the previous output.
CPUPRINT.KVM
shows the output for an
Intel® Xeon® Platinum 8124M
processor running under Linux’
KVM.
CPUPRINT.EXE
supports multiple specifications of (real
and virtualised) x86 and x64 processors
from several vendors:
CPUPRINT.EXE
is a pure Win32
binary executable, written from scratch in
ANSI C,
built with the CPUPRINT.EXE
is available for the I386
alias x86 and AMD64 alias
x64 processor architectures of
Windows NT.
Note: on the IA64 processor
architecture, the CPUID
instruction is supported in the
emulated I386 alias x86 execution
environment only!
Note: CPUPRINT.EXE
is neither based on
other (abandoned or outdated) tools like
cpuid,
cpuid,
cpuid
or
CPUID explorer part 1
and
CPUID explorer part 2
nor related to any of them!
CPUPRINT.EXE
is
digitally signed
using a (self-issued)
X.509
leaf certificate
and
time stamped.
Download and install the (self-signed) X.509 root certificate to validate and verify the digital certificate and the signature.
Use the X.509 certificate to send S/MIME encrypted mail.
Note: email in weird format and without a proper sender name is likely to be discarded!
I dislike
HTML (and even
weirder formats too) in email, I prefer to receive plain text.
I also expect to see your full (real) name as sender, not your
nickname.
I abhor top posts and expect inline quotes in replies.
as iswithout any warranty, neither express nor implied.
cookiesin the web browser.
The web service is operated and provided by
Telekom Deutschland GmbH The web service provider stores a session cookie
in the web
browser and records every visit of this web site with the following
data in an access log on their server(s):