loopback-off
VMware testing on Ubuntu 16.04 via the Phoronix Test Suite.
KPTI-off
Processor: 2 x Intel Core i7-7700HQ (4 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 4096MB, Disk: 21GB VMware Virtual S, Graphics: SVGA3D; build: RELEASE; LLVM;, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: Ubuntu 16.04, Kernel: 4.15.0-99-generic (x86_64) 20200422, Desktop: Unity 7.4.5, Display Server: X Server 1.19.6, Display Driver: modesetting 1.19.6, OpenGL: 3.3 Mesa 18.0.5, Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 800x881, System Layer: VMware
Processor Notes: CPU Microcode: 0x8e
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Not affected
Loopback TCP Network Performance
This test measures the loopback network adapter performance using a micro-benchmark to measure the TCP performance. Learn more via the OpenBenchmarking.org test page.
KPTI-off
Processor: 2 x Intel Core i7-7700HQ (4 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 4096MB, Disk: 21GB VMware Virtual S, Graphics: SVGA3D; build: RELEASE; LLVM;, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: Ubuntu 16.04, Kernel: 4.15.0-99-generic (x86_64) 20200422, Desktop: Unity 7.4.5, Display Server: X Server 1.19.6, Display Driver: modesetting 1.19.6, OpenGL: 3.3 Mesa 18.0.5, Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 800x881, System Layer: VMware
Processor Notes: CPU Microcode: 0x8e
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 4 May 2020 07:36 by user ymy.