On startup this notofication appears…
How to solve???
Filesystem mounted at ‘/run/media/rhmerin/Tutorials’ is not responding
inxi -fazy ✔
CPU:
Info: Dual Core model: Intel Core i3-4150 bits: 64 type: MT MCP
arch: Haswell family: 6 model-id: 3C (60) stepping: 3 microcode: 28 cache:
L2: 3 MiB bogomips: 27999
Speed: 3300 MHz min/max: 800/3500 MHz Core speeds (MHz): 1: 3300 2: 3300
3: 3302 4: 3301
Flags: abm acpi aes aperfmperf apic arat arch_perfmon avx avx2 bmi1 bmi2 bts
clflush cmov constant_tsc cpuid cpuid_fault cx16 cx8 de ds_cpl dtes64 dtherm
dts ept ept_ad erms est f16c flexpriority flush_l1d fma fpu fsgsbase fxsr ht
ibpb ibrs invpcid invpcid_single lahf_lm lm mca mce md_clear mmx monitor
movbe msr mtrr nonstop_tsc nopl nx pae pat pbe pcid pclmulqdq pdcm pdpe1gb
pebs pge pln pni popcnt pse pse36 pti pts rdrand rdtscp rep_good sdbg sep
smep ss ssbd sse sse2 sse4_1 sse4_2 ssse3 stibp syscall tm tm2 tpr_shadow
tsc tsc_adjust tsc_deadline_timer vme vmx vnmi vpid xsave xsaveopt xtopology
xtpr
Vulnerabilities: Type: itlb_multihit status: KVM: VMX disabled
Type: l1tf
mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
Type: mds mitigation: Clear CPU buffers; SMT vulnerable
Type: meltdown mitigation: PTI
Type: spec_store_bypass
mitigation: Speculative Store Bypass disabled via prctl and seccomp
Type: spectre_v1
mitigation: usercopy/swapgs barriers and __user pointer sanitization
Type: spectre_v2 mitigation: Full generic retpoline, IBPB: conditional,
IBRS_FW, STIBP: conditional, RSB filling
Type: srbds mitigation: Microcode
Type: tsx_async_abort status: Not affected