Ubuntu 20.04 OpenZFS Glibc -miti GCC 9.3
Disk Notes: NONE / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Disk Notes: KYBER / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-gentoo-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Disk Notes: MQ-DEADLINE / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Disk Notes: NONE / discard,errors=remount-ro,noatime,rw
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3615QM @ 2.30GHz (8 Cores), Motherboard: Apple MacBookPro10 1 1.0, Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 218GB, Graphics: Unknown 981MB, Audio: NVIDIA (0x0e1b) HDA
OS: FreeBSD, Kernel: 12.1-RELEASE (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: Clang 8.0.1 (SVN 366581), File-System: zfs, Screen Resolution: 2880x1800
Environment Notes: LIBGL_ALWAYS_SOFTWARE=1
Security Notes: KPTI
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: Intel HD 4000, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: VoidLinux rolling, Kernel: 5.8.9_1 (x86_64), Display Server: X Server 1.20.9, Display Driver: intel 2.99.917, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 2880x1800
Kernel Notes: i915.enable_rc6=7 i915.enable_fbc=1 i915.fastboot=1
Compiler Notes: --build=x86_64-linux-musl --disable-libsanitizer --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-symvers --disable-target-libiberty --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-fast-character --enable-languages=c,c++,objc,obj-c++,fortran,lto,go,ada --enable-lto --enable-plugins --enable-serial-configure --enable-shared --enable-threads=posix --enable-vtable-verify --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: MQ-DEADLINE / relatime,rw
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core 2 Duo P7350 @ 2.00GHz (2 Cores), Motherboard: MSI MS-1722 (A1722IMS V1.11 BIOS), Chipset: Intel Mobile 4 MCH + ICH9M, Memory: 4096MB, Disk: 250GB Samsung SSD 860, Graphics: MSI NVIDIA NV96 512MB, Audio: Realtek ALC1200, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR242x / AR542x
OS: VoidLinux rolling, Kernel: 5.8.9_1 (x86_64), Display Server: X Server 1.20.9, Display Driver: nouveau 1.0.16, OpenGL: 3.3 Mesa 20.1.7, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: f2fs, Screen Resolution: 1440x900
Compiler Notes: --build=x86_64-linux-musl --disable-libsanitizer --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-symvers --disable-target-libiberty --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-fast-character --enable-languages=c,c++,objc,obj-c++,fortran,lto,go,ada --enable-lto --enable-plugins --enable-serial-configure --enable-shared --enable-threads=posix --enable-vtable-verify --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: MQ-DEADLINE / acl,active_logs=6,alloc_mode=default,background_gc=on,discard,extent_cache,flush_merge,fsync_mode=posix,inline_data,inline_dentry,inline_xattr,lazytime,mode=adaptive,no_heap,relatime,rw,user_xattr
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x60c
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
OS: OpenMandrivaLinux 4.1, Kernel: 5.5.12-desktop-1omv4001 (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 3.3 Mesa 20.0.7, Compiler: Clang 9.0.1 + GCC 9.2.1 20191207 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 1440x900
Kernel Notes: dm_mod.use_blk_mq=1
Environment Notes: AMD_DEBUG=nodcc
Disk Notes: MQ-DEADLINE / discard,noatime,rw,stripe=256
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + tsx_async_abort: Not affected
OS: Fedora 33, Kernel: 5.8.9-301.fc33.x86_64 (x86_64), Desktop: MATE 1.24.1, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 3.3 Mesa 20.2.0-rc4, Compiler: GCC 10.2.1 20200826, File-System: btrfs, Screen Resolution: 1440x900
Disk Notes: BFQ / relatime,rw,seclabel,space_cache,ssd,subvol=/home,subvolid=256
Processor Notes: Scaling Governor: acpi-cpufreq performance
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
OS: Ubuntu 20.04, Kernel: 5.4.0-47-generic (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 3.3 Mesa 20.0.8, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 1440x900
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x60f
Disk Scheduler Notes: NONE
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
FS_Mark is designed to test a system's file-system performance. Learn more via the OpenBenchmarking.org test page.
Fio is an advanced disk benchmark that depends upon the kernel's AIO access library. Learn more via the OpenBenchmarking.org test page.
Disk Notes: NONE / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 18 August 2020 10:52 by user tux.
Disk Notes: KYBER / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 18 August 2020 12:02 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-gentoo-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Disk Notes: MQ-DEADLINE / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 18 August 2020 13:03 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Disk Notes: NONE / discard,errors=remount-ro,noatime,rw
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 18 August 2020 13:54 by user tux.
Processor: Intel Core i7-3615QM @ 2.30GHz (8 Cores), Motherboard: Apple MacBookPro10 1 1.0, Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 218GB, Graphics: Unknown 981MB, Audio: NVIDIA (0x0e1b) HDA
OS: FreeBSD, Kernel: 12.1-RELEASE (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: Clang 8.0.1 (SVN 366581), File-System: zfs, Screen Resolution: 2880x1800
Environment Notes: LIBGL_ALWAYS_SOFTWARE=1
Security Notes: KPTI
Testing initiated at 11 September 2020 10:26 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: Intel HD 4000, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: VoidLinux rolling, Kernel: 5.8.9_1 (x86_64), Display Server: X Server 1.20.9, Display Driver: intel 2.99.917, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 2880x1800
Kernel Notes: i915.enable_rc6=7 i915.enable_fbc=1 i915.fastboot=1
Compiler Notes: --build=x86_64-linux-musl --disable-libsanitizer --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-symvers --disable-target-libiberty --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-fast-character --enable-languages=c,c++,objc,obj-c++,fortran,lto,go,ada --enable-lto --enable-plugins --enable-serial-configure --enable-shared --enable-threads=posix --enable-vtable-verify --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: MQ-DEADLINE / relatime,rw
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 16 September 2020 21:44 by user .
Processor: Intel Core 2 Duo P7350 @ 2.00GHz (2 Cores), Motherboard: MSI MS-1722 (A1722IMS V1.11 BIOS), Chipset: Intel Mobile 4 MCH + ICH9M, Memory: 4096MB, Disk: 250GB Samsung SSD 860, Graphics: MSI NVIDIA NV96 512MB, Audio: Realtek ALC1200, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR242x / AR542x
OS: VoidLinux rolling, Kernel: 5.8.9_1 (x86_64), Display Server: X Server 1.20.9, Display Driver: nouveau 1.0.16, OpenGL: 3.3 Mesa 20.1.7, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: f2fs, Screen Resolution: 1440x900
Compiler Notes: --build=x86_64-linux-musl --disable-libsanitizer --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-symvers --disable-target-libiberty --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-fast-character --enable-languages=c,c++,objc,obj-c++,fortran,lto,go,ada --enable-lto --enable-plugins --enable-serial-configure --enable-shared --enable-threads=posix --enable-vtable-verify --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: MQ-DEADLINE / acl,active_logs=6,alloc_mode=default,background_gc=on,discard,extent_cache,flush_merge,fsync_mode=posix,inline_data,inline_dentry,inline_xattr,lazytime,mode=adaptive,no_heap,relatime,rw,user_xattr
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x60c
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 September 2020 16:01 by user .
Processor: Intel Core 2 Duo P7350 @ 2.00GHz (2 Cores), Motherboard: MSI MS-1722 (A1722IMS V1.11 BIOS), Chipset: Intel Mobile 4 MCH + ICH9M, Memory: 4096MB, Disk: 250GB Samsung SSD 860, Graphics: MSI NVIDIA NV96 512MB, Audio: Realtek ALC1200, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR242x / AR542x
OS: OpenMandrivaLinux 4.1, Kernel: 5.5.12-desktop-1omv4001 (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 3.3 Mesa 20.0.7, Compiler: Clang 9.0.1 + GCC 9.2.1 20191207 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 1440x900
Kernel Notes: dm_mod.use_blk_mq=1
Environment Notes: AMD_DEBUG=nodcc
Disk Notes: MQ-DEADLINE / discard,noatime,rw,stripe=256
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + tsx_async_abort: Not affected
Testing initiated at 17 September 2020 21:50 by user tux.
Processor: Intel Core 2 Duo P7350 @ 2.00GHz (2 Cores), Motherboard: MSI MS-1722 (A1722IMS V1.11 BIOS), Chipset: Intel Mobile 4 MCH + ICH9M, Memory: 4096MB, Disk: 250GB Samsung SSD 860, Graphics: MSI NVIDIA NV96 512MB, Audio: Realtek ALC1200, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR242x / AR542x
OS: Fedora 33, Kernel: 5.8.9-301.fc33.x86_64 (x86_64), Desktop: MATE 1.24.1, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 3.3 Mesa 20.2.0-rc4, Compiler: GCC 10.2.1 20200826, File-System: btrfs, Screen Resolution: 1440x900
Disk Notes: BFQ / relatime,rw,seclabel,space_cache,ssd,subvol=/home,subvolid=256
Processor Notes: Scaling Governor: acpi-cpufreq performance
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 18 September 2020 21:41 by user tux.
Processor: Intel Core 2 Duo P7350 @ 2.00GHz (2 Cores), Motherboard: MSI MS-1722 (A1722IMS V1.11 BIOS), Chipset: Intel Mobile 4 MCH + ICH9M, Memory: 4096MB, Disk: 250GB Samsung SSD 860, Graphics: MSI NVIDIA NV96 512MB, Audio: Realtek ALC1200, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR242x / AR542x
OS: Ubuntu 20.04, Kernel: 5.4.0-47-generic (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 3.3 Mesa 20.0.8, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 1440x900
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x60f
Disk Scheduler Notes: NONE
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 19 September 2020 17:10 by user tux.