Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1799469 Details for
Bug 1980152
[abrt] openbox: __libc_connect(): openbox killed by SIGABRT
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
File: cpuinfo
cpuinfo (text/plain), 1.92 KB, created by
robert fairbrother
on 2021-07-07 22:35:09 UTC
(
hide
)
Description:
File: cpuinfo
Filename:
MIME Type:
Creator:
robert fairbrother
Created:
2021-07-07 22:35:09 UTC
Size:
1.92 KB
patch
obsolete
>Architecture: x86_64 >CPU op-mode(s): 32-bit, 64-bit >Address sizes: 36 bits physical, 48 bits virtual >Byte Order: Little Endian >CPU(s): 2 >On-line CPU(s) list: 0,1 >Vendor ID: GenuineIntel >BIOS Vendor ID: Intel >Model name: Intel(R) Core(TM)2 Duo CPU T5450 @ 1.66GHz >BIOS Model name: CPU Version >CPU family: 6 >Model: 15 >Thread(s) per core: 1 >Core(s) per socket: 2 >Socket(s): 1 >Stepping: 13 >CPU max MHz: 1667.0000 >CPU min MHz: 1000.0000 >BogoMIPS: 3333.00 >Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good nopl cpuid aperfmperf pni dtes64 monitor ds_cpl est tm2 ssse3 cx16 xtpr pdcm lahf_lm pti dtherm >L1d cache: 64 KiB (2 instances) >L1i cache: 64 KiB (2 instances) >L2 cache: 2 MiB (1 instance) >NUMA node(s): 1 >NUMA node0 CPU(s): 0,1 >Vulnerability Itlb multihit: KVM: Mitigation: VMX unsupported >Vulnerability L1tf: Mitigation; PTE Inversion >Vulnerability Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled >Vulnerability Meltdown: Mitigation; PTI >Vulnerability Spec store bypass: Vulnerable >Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization >Vulnerability Spectre v2: Mitigation; Full generic retpoline, STIBP disabled, RSB filling >Vulnerability Srbds: Not affected >Vulnerability Tsx async abort: Not affected
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1980152
:
1799467
|
1799468
| 1799469 |
1799470
|
1799471
|
1799472
|
1799473
|
1799474
|
1799475
|
1799476