Inxi for my rig


╭─[email protected] in ~  
╰─λ inxi -faz
CPU:
Info: model: Intel Core i7-3770K bits: 64 type: MT MCP arch: Ivy Bridge
family: 6 model-id: 0x3A (58) stepping: 9 microcode: 0x21
Topology: cpus: 1x cores: 4 tpc: 2 threads: 8 smt: enabled cache:
L1: 256 KiB desc: d-4x32 KiB; i-4x32 KiB L2: 1024 KiB desc: 4x256 KiB
L3: 8 MiB desc: 1x8 MiB
Speed (MHz): avg: 3900 high: 3902 min/max: 1600/3900 scaling:
driver: intel_cpufreq governor: performance cores: 1: 3901 2: 3902 3: 3901
4: 3900 5: 3898 6: 3899 7: 3900 8: 3900 bogomips: 55999
Flags: acpi aes aperfmperf apic arat arch_perfmon avx bts clflush cmov
constant_tsc cpuid cpuid_fault cx16 cx8 de ds_cpl dtes64 dtherm dts epb
erms est f16c flush_l1d fpu fsgsbase fxsr ht ibpb ibrs ida lahf_lm lm mca
mce md_clear mmx monitor msr mtrr nonstop_tsc nopl nx pae pat pbe pcid
pclmulqdq pdcm pebs pge pln pni popcnt pse pse36 pti pts rdrand rdtscp
rep_good sep smep ss ssbd sse sse2 sse4_1 sse4_2 ssse3 stibp syscall tm
tm2 tsc tsc_deadline_timer vme xsave xsaveopt xtopology xtpr
Vulnerabilities:
Type: itlb_multihit status: KVM: VMX unsupported
Type: l1tf mitigation: PTE Inversion
Type: mds mitigation: Clear CPU buffers; SMT vulnerable
Type: meltdown mitigation: PTI
Type: spec_store_bypass
mitigation: Speculative Store Bypass disabled via prctl
Type: spectre_v1
mitigation: usercopy/swapgs barriers and __user pointer sanitization
Type: spectre_v2 mitigation: Full generic retpoline, IBPB: conditional,
IBRS_FW, STIBP: conditional, RSB filling
Type: srbds status: Vulnerable: No microcode
Type: tsx_async_abort status: Not affected
2 Likes