https://bugs.kde.org/show_bug.cgi?id=425650
Don Curtis <bugrprt21...@online.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |bugrprt21...@online.de --- Comment #1 from Don Curtis <bugrprt21...@online.de> --- System hardware information - purchased last week: Machine: Type: Desktop Mobo: ASUSTeK model: PRIME B450-PLUS v: Rev X.0x serial: <filter> UEFI: American Megatrends v: 2008 date: 12/06/2019 CPU: Topology: Quad Core model: AMD Ryzen 5 3400G with Radeon Vega Graphics bits: 64 type: MT MCP arch: Zen+ family: 17 (23) model-id: 18 (24) stepping: 1 microcode: 8108109 L1 cache: 384 KiB L2 cache: 2048 KiB L3 cache: 4096 KiB flags: avx avx2 lm nx pae sse sse2 sse3 sse4_1 sse4_2 sse4a ssse3 svm bogomips: 65602 Speed: 1260 MHz min/max: 1400/4100 MHz boost: enabled Core speeds (MHz): 1: 1462 2: 1258 3: 1258 4: 1511 5: 1571 6: 1258 7: 1215 8: 2202 Vulnerabilities: Type: itlb_multihit status: Not affected Type: l1tf status: Not affected Type: mds status: Not affected Type: meltdown status: Not affected Type: spec_store_bypass mitigation: Speculative Store Bypass disabled via prctl and seccomp Type: spectre_v1 mitigation: usercopy/swapgs barriers and __user pointer sanitization Type: spectre_v2 mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling Type: srbds status: Not affected Type: tsx_async_abort status: Not affected -- You are receiving this mail because: You are watching all bug changes.