intelcascadelaketaavulnerability-namd-notsx
intelcascadelaketaavulnerability-namd-notsx_run1
intelcascadelaketaavulnerability-namd-notsx_run1
Processor: 2 x Intel Xeon (Skylake IBRS) (2 Cores / 4 Threads), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (?-20170928_130252-buildbot BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 4096 MB RAM QEMU, Disk: 36GB, Graphics: Red Hat QXL paravirtual graphic card, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 4.15.0-70-generic (x86_64), Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
NAMD
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
intelcascadelaketaavulnerability-namd-notsx_run1
Processor: 2 x Intel Xeon (Skylake IBRS) (2 Cores / 4 Threads), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (?-20170928_130252-buildbot BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 4096 MB RAM QEMU, Disk: 36GB, Graphics: Red Hat QXL paravirtual graphic card, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 4.15.0-70-generic (x86_64), Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 22 November 2019 10:49 by user root.