Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1671212 Details for
Bug 1814860
[abrt] jack-audio-connection-kit-example-clients: main(): jack_property killed by SIGSEGV
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
File: cpuinfo
cpuinfo (text/plain), 2.02 KB, created by
Bruno Vernay
on 2020-03-18 20:27:43 UTC
(
hide
)
Description:
File: cpuinfo
Filename:
MIME Type:
Creator:
Bruno Vernay
Created:
2020-03-18 20:27:43 UTC
Size:
2.02 KB
patch
obsolete
>Architecture: x86_64 >CPU op-mode(s): 32-bit, 64-bit >Byte Order: Little Endian >Address sizes: 39 bits physical, 48 bits virtual >CPU(s): 3 >On-line CPU(s) list: 0-2 >Thread(s) per core: 1 >Core(s) per socket: 3 >Socket(s): 1 >NUMA node(s): 1 >Vendor ID: GenuineIntel >CPU family: 6 >Model: 158 >Model name: Intel(R) Core(TM) i7-7820HQ CPU @ 2.90GHz >Stepping: 9 >CPU MHz: 2904.002 >BogoMIPS: 5808.00 >Virtualization: VT-x >Hypervisor vendor: KVM >Virtualization type: full >L1d cache: 96 KiB >L1i cache: 96 KiB >L2 cache: 768 KiB >L3 cache: 24 MiB >NUMA node0 CPU(s): 0-2 >Vulnerability Itlb multihit: KVM: Mitigation: Split huge pages >Vulnerability L1tf: Mitigation; PTE Inversion; VMX EPT disabled >Vulnerability Mds: Mitigation; Clear CPU buffers; SMT Host state unknown >Vulnerability Meltdown: Mitigation; PTI >Vulnerability Spec store bypass: Vulnerable >Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization >Vulnerability Spectre v2: Mitigation; Full generic retpoline, STIBP disabled, RSB filling >Vulnerability Tsx async abort: Not affected >Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx rdtscp lm constant_tsc rep_good nopl xtopology nonstop_tsc cpuid tsc_known_freq pni pclmulqdq vmx ssse3 cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt aes xsave avx rdrand hypervisor lahf_lm abm 3dnowprefetch invpcid_single pti tpr_shadow vnmi flexpriority vpid fsgsbase avx2 invpcid rdseed clflushopt md_clear flush_l1d
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1814860
:
1671210
|
1671211
| 1671212 |
1671213
|
1671214
|
1671215
|
1671216
|
1671217
|
1671218
|
1671219
|
1671220