Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1977172 Details for
Bug 2224927
[abrt] xdg-desktop-portal: g_mutex_lock(): xdg-desktop-portal killed by SIGSEGV
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh89 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
File: cpuinfo
cpuinfo (text/plain), 2.78 KB, created by
Yonatan
on 2023-07-24 00:39:15 UTC
(
hide
)
Description:
File: cpuinfo
Filename:
MIME Type:
Creator:
Yonatan
Created:
2023-07-24 00:39:15 UTC
Size:
2.78 KB
patch
obsolete
>Arquitectura: x86_64 >modo(s) de operación de las CPUs: 32-bit, 64-bit >Tamaños de las direcciones: 36 bits physical, 48 bits virtual >Orden de los bytes: Little Endian >CPU(s): 4 >Lista de la(s) CPU(s) en lÃnea: 0-3 >ID de fabricante: GenuineIntel >ID de fabricante de BIOS: Intel >Nombre del modelo: Intel(R) Core(TM) i5 CPU 650 @ 3.20GHz >Nombre del modelo de BIOS: Intel(R) Core(TM) i5 CPU 650 @ 3.20GHz To Be Filled By O.E.M. CPU @ 3.2GHz >BIOS CPU family: 205 >Familia de CPU: 6 >Modelo: 37 >Hilo(s) de procesamiento por núcleo: 2 >Núcleo(s) por «socket»: 2 >«Socket(s)»: 1 >Revisión: 5 >Aumento de frecuencia: activada >CPU(s) scaling MHz: 105% >CPU MHz máx.: 3201,0000 >CPU MHz mÃn.: 1200,0000 >BogoMIPS: 6425,22 >Indicadores: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr pdcm pcid sse4_1 sse4_2 popcnt aes lahf_lm pti ssbd ibrs ibpb stibp tpr_shadow vnmi flexpriority ept vpid dtherm ida arat flush_l1d >Virtualización: VT-x >Caché L1d: 64 KiB (2 instancias) >Caché L1i: 64 KiB (2 instancias) >Caché L2: 512 KiB (2 instancias) >Caché L3: 4 MiB (1 instancia) >Modo(s) NUMA: 1 >CPU(s) del nodo NUMA 0: 0-3 >Vulnerabilidad Itlb multihit: KVM: Mitigation: VMX disabled >Vulnerabilidad L1tf: Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulnerable >Vulnerabilidad Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable >Vulnerabilidad Meltdown: Mitigation; PTI >Vulnerabilidad Mmio stale data: Unknown: No mitigations >Vulnerabilidad Retbleed: Not affected >Vulnerabilidad Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl >Vulnerabilidad Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization >Vulnerabilidad Spectre v2: Mitigation; Retpolines, IBPB conditional, IBRS_FW, STIBP conditional, RSB filling, PBRSB-eIBRS Not affected >Vulnerabilidad Srbds: Not affected >Vulnerabilidad Tsx async abort: Not affected
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 2224927
:
1977165
|
1977166
|
1977167
|
1977168
|
1977169
|
1977170
|
1977171
| 1977172 |
1977173
|
1977174
|
1977175
|
1977176