Mitigation: usercopy/swapgs barriers and _user pointer sanitization Mitigation: Speculative Store Bypass disabled via prctl and seccomp Type: mds mitigation: Clear CPU buffers SMT vulnerable Mitigation: PTE Inversion VMX: conditional cache flushes, SMT vulnerable Vulnerabilities: Type: itlb_multihit status: KVM: VMX disabled Microcode: B4 cache: L1: 384 KiB L2: 1.5 MiB 元: 12 MiBįlags: avx avx2 ht lm nx pae sse sse2 sse3 sse4_1 sse4_2 ssse3 vmx Info: 6-Core model: Intel Core i7-9750H bits: 64 type: MT MCPĪrch: Kaby Lake note: check family: 6 model-id: 9E (158) stepping: A (10) Serial: charge: 55% (should be ignored) rechargeable: yesĭevice-2: hidpp_battery_1 model: Logitech MK700 serial: Ĭharge: 70% (should be ignored) rechargeable: yes status: Discharging MS-16W1 type: Li-ion serial: N/Aĭevice-1: hidpp_battery_0 model: Logitech Wireless Mouse MX Master UEFI: American Megatrends v: E16W1IMS.10A date: Mobo: Micro-Star model: MS-16W1 v: REV:1.0 serial: Type: Laptop System: Micro-Star product: GF65 Thin 9SEXR v: REV:1.0 Root=UUID=29a3eb0d-409e-4b7a-b588-0c3a1172fdd1 rw rootflags=subvol=rootĬryptdevice=/dev/nvme0n1p3:archlinux loglevel=3 quiet nvidia-drm.modeset=1ĭesktop: KDE Plasma 5.23.4 tk: Qt 5.15.2 wm: kwin_x11 vt: 1 dm: SDDM Parameters: BOOT_IMAGE=/vmlinuz-linux-lts
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |