resdis_tests
VMware testing on Ubuntu 16.04 via the Phoronix Test Suite.
certa
Processor: 2 x Intel Xeon E3-12xx v2 (Ivy Bridge IBRS) (4 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.12.0-0-ga698c8995f-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 8192 MB RAM QEMU, Disk: 20GB, Graphics: llvmpipe 8GB, Network: 2 x Intel 82540EM
OS: Ubuntu 16.04, Kernel: 4.15.0-51-generic (x86_64), Desktop: Unity 7.4.5, Display Server: X Server 1.19.6, Display Driver: modesetting 1.19.6, OpenGL: 3.3 Mesa 18.0.5 (LLVM 6.0 256 bits), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1024x768, System Layer: qemu
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling
vm
Processor: 4 x Intel Xeon E5-2650 v2 (7 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 8192 MB DRAM, Disk: 107GB Virtual disk, Graphics: llvmpipe 8GB, Network: VMware VMXNET3
OS: Ubuntu 16.04, Kernel: 4.15.0-51-generic (x86_64), Desktop: Unity 7.4.5, Display Server: X Server 1.19.6, Display Driver: modesetting 1.19.6, OpenGL: 3.3 Mesa 18.0.5 (LLVM 6.0 256 bits), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 800x600, System Layer: VMware
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Redis
Learn more via the OpenBenchmarking.org test page.
certa
Processor: 2 x Intel Xeon E3-12xx v2 (Ivy Bridge IBRS) (4 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.12.0-0-ga698c8995f-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 8192 MB RAM QEMU, Disk: 20GB, Graphics: llvmpipe 8GB, Network: 2 x Intel 82540EM
OS: Ubuntu 16.04, Kernel: 4.15.0-51-generic (x86_64), Desktop: Unity 7.4.5, Display Server: X Server 1.19.6, Display Driver: modesetting 1.19.6, OpenGL: 3.3 Mesa 18.0.5 (LLVM 6.0 256 bits), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1024x768, System Layer: qemu
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling
Testing initiated at 12 June 2019 11:28 by user root.
vm
Processor: 4 x Intel Xeon E5-2650 v2 (7 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 8192 MB DRAM, Disk: 107GB Virtual disk, Graphics: llvmpipe 8GB, Network: VMware VMXNET3
OS: Ubuntu 16.04, Kernel: 4.15.0-51-generic (x86_64), Desktop: Unity 7.4.5, Display Server: X Server 1.19.6, Display Driver: modesetting 1.19.6, OpenGL: 3.3 Mesa 18.0.5 (LLVM 6.0 256 bits), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 800x600, System Layer: VMware
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 12 June 2019 10:49 by user root.