Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1884224 Details for
Bug 2091088
[abrt] policycoreutils: BZ2_decompress(): semodule killed by SIGSEGV
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
File: cpuinfo
cpuinfo (text/plain), 1.92 KB, created by
Mike FABIAN
on 2022-05-27 14:37:45 UTC
(
hide
)
Description:
File: cpuinfo
Filename:
MIME Type:
Creator:
Mike FABIAN
Created:
2022-05-27 14:37:45 UTC
Size:
1.92 KB
patch
obsolete
>Architecture: x86_64 >CPU op-mode(s): 32-bit, 64-bit >Address sizes: 40 bits physical, 48 bits virtual >Byte Order: Little Endian >CPU(s): 2 >On-line CPU(s) list: 0,1 >Vendor ID: GenuineIntel >BIOS Vendor ID: QEMU >Model name: QEMU Virtual CPU version 2.5+ >BIOS Model name: pc-i440fx-4.2 CPU @ 2.0GHz >BIOS CPU family: 1 >CPU family: 6 >Model: 6 >Thread(s) per core: 1 >Core(s) per socket: 1 >Socket(s): 2 >Stepping: 3 >BogoMIPS: 5424.08 >Flags: fpu de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pse36 clflush mmx fxsr sse sse2 syscall nx lm rep_good nopl xtopology cpuid tsc_known_freq pni cx16 x2apic hypervisor lahf_lm cpuid_fault pti >Hypervisor vendor: KVM >Virtualization type: full >L1d cache: 64 KiB (2 instances) >L1i cache: 64 KiB (2 instances) >L2 cache: 8 MiB (2 instances) >L3 cache: 32 MiB (2 instances) >NUMA node(s): 1 >NUMA node0 CPU(s): 0,1 >Vulnerability Itlb multihit: KVM: Mitigation: VMX unsupported >Vulnerability L1tf: Mitigation; PTE Inversion >Vulnerability Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown >Vulnerability Meltdown: Mitigation; PTI >Vulnerability Spec store bypass: Vulnerable >Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization >Vulnerability Spectre v2: Mitigation; Retpolines, STIBP disabled, RSB filling >Vulnerability Srbds: Not affected >Vulnerability Tsx async abort: Not affected
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 2091088
:
1884222
|
1884223
| 1884224 |
1884225
|
1884226
|
1884227
|
1884228
|
1884229
|
1884230
|
1884231
|
1884232