Docker testing on Ubuntu 20.04.1 LTS via the Phoronix Test Suite.
Processor: Intel Core i5-8400 (4 Cores), Motherboard: Microsoft Virtual Machine v7.0 (090008 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 1072 MB Microsoft, Disk: 32GB Virtual Disk, Graphics: llvmpipe 1GB
OS: CentOS Linux 7, Kernel: 3.10.0-1062.18.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 2.1 Mesa 18.3.4 (LLVM 7.0 256 bits), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 3840x1200, System Layer: microsoft
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Disk Notes: DEADLINE / attr2,inode64,noquota,relatime,rw,seclabel
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel) IBPB + tsx_async_abort: Not affected
Processor: Intel Core i5-9400F (4 Cores), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.0 BIOS), Memory: 10GB, Disk: 64GB Virtual Disk
OS: Clear Linux OS 29390, Kernel: 4.19.76-linuxkit (x86_64), Compiler: GCC 9.1.1 20190512 gcc-9-branch@271104 + Clang 8.0.0 + LLVM 8.0.0, File-System: overlayfs, System Layer: microsoft
Compiler Notes: --build=x86_64-generic-linux --disable-libmpx --disable-libunwind-exceptions --disable-multiarch --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-clocale=gnu --enable-default-pie --enable-gnu-indirect-function --enable-languages=c,c++,fortran,go --enable-ld=default --enable-libstdcxx-pch --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --exec-prefix=/usr --includedir=/usr/include --target=x86_64-generic-linux --with-arch=westmere --with-gcc-major-version-only --with-glibc-version=2.19 --with-gnu-ld --with-isl --with-ppl=yes --with-tune=haswell
Processor Notes: CPU Microcode: 0xffffffff
Disk Scheduler Notes: DEADLINE
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling
Processor: 2 x Intel Xeon E5620 @ 2.40GHz (8 Cores / 16 Threads), Motherboard: HP ProLiant DL380 G7 (P67 BIOS), Memory: 32GB, Disk: 1000GB LOGICAL VOLUME + 2000GB LOGICAL VOLUME, Graphics: radeondrmfb
OS: Clear Linux OS 29390, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Compiler: GCC 9.1.1 20190512 gcc-9-branch@271104 + Clang 8.0.0 + LLVM 8.0.0, File-System: xfs, Screen Resolution: 1024x768, System Layer: container-other
Compiler Notes: --build=x86_64-generic-linux --disable-libmpx --disable-libunwind-exceptions --disable-multiarch --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-clocale=gnu --enable-default-pie --enable-gnu-indirect-function --enable-languages=c,c++,fortran,go --enable-ld=default --enable-libstdcxx-pch --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --exec-prefix=/usr --includedir=/usr/include --target=x86_64-generic-linux --with-arch=westmere --with-gcc-major-version-only --with-glibc-version=2.19 --with-gnu-ld --with-isl --with-ppl=yes --with-tune=haswell
Disk Notes: DEADLINE / attr2,inode64,logbsize=128k,noquota,nouuid,relatime,rw,sunit=256,swidth=256
Processor Notes: Scaling Governor: pcc-cpufreq conservative - CPU Microcode: 0x1f
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + tsx_async_abort: Not affected
Processor: Intel Core i5-7400 @ 3.50GHz (4 Cores), Motherboard: ASUS PRIME B250M-PLUS (0607 BIOS), Memory: 8GB, Disk: 250GB Samsung SSD 850, Graphics: (1000MHz), Audio: Realtek ALC887-VD
OS: Clear Linux OS 29390, Kernel: 3.10.0-957.10.1.el7.x86_64 (x86_64), Compiler: GCC 9.1.1 20190512 gcc-9-branch@271104 + Clang 8.0.0 + LLVM 8.0.0, File-System: overlayfs, System Layer: container-other
Compiler Notes: --build=x86_64-generic-linux --disable-libmpx --disable-libunwind-exceptions --disable-multiarch --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-clocale=gnu --enable-default-pie --enable-gnu-indirect-function --enable-languages=c,c++,fortran,go --enable-ld=default --enable-libstdcxx-pch --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --exec-prefix=/usr --includedir=/usr/include --target=x86_64-generic-linux --with-arch=westmere --with-gcc-major-version-only --with-glibc-version=2.19 --with-gnu-ld --with-isl --with-ppl=yes --with-tune=haswell
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x8e
Disk Scheduler Notes: DEADLINE
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: SMT disabled L1D conditional cache flushes + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel)
Processor: 4 x AMD EPYC (with IBPB) (4 Cores), Motherboard: RDO OpenStack Compute (1.11.0-2.el7 BIOS), Memory: 4096MB, Disk: 50GB, Graphics: cirrusdrmfb
OS: Clear Linux OS 29390, Kernel: 3.10.0-1062.el7.x86_64 (x86_64), Compiler: GCC 9.1.1 20190512 gcc-9-branch@271104 + Clang 8.0.0 + LLVM 8.0.0, File-System: overlayfs, Screen Resolution: 1024x768, System Layer: container-other
Compiler Notes: --build=x86_64-generic-linux --disable-libmpx --disable-libunwind-exceptions --disable-multiarch --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-clocale=gnu --enable-default-pie --enable-gnu-indirect-function --enable-languages=c,c++,fortran,go --enable-ld=default --enable-libstdcxx-pch --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --exec-prefix=/usr --includedir=/usr/include --target=x86_64-generic-linux --with-arch=westmere --with-gcc-major-version-only --with-glibc-version=2.19 --with-gnu-ld --with-isl --with-ppl=yes --with-tune=haswell
Processor Notes: CPU Microcode: 0x1000065
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB
Changed Memory to 8GB.
Changed Disk to 197GB.
Processor: 4 x Intel Xeon (Cascadelake) (4 Cores), Motherboard: RDO OpenStack Compute (1.13.0-2.el8 BIOS), Memory: 32GB, Disk: 59GB, Graphics: cirrusdrmfb
OS: Ubuntu 20.04.1 LTS, Kernel: 3.10.0-1160.15.2.el7.x86_64 (x86_64), Display Driver: cirrusdrmfb, Compiler: GCC 9.3.0, File-System: overlayfs, Screen Resolution: 1024x768, System Layer: Docker
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-HskZEa/gcc-9-9.3.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT Host state unknown
Ctx_clock is a simple test program to measure the context switch time in clock cycles. Learn more via the OpenBenchmarking.org test page.
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
The IOzone benchmark tests the hard disk drive / file-system performance. Learn more via the OpenBenchmarking.org test page.
The Himeno benchmark is a linear solver of pressure Poisson using a point-Jacobi method. Learn more via the OpenBenchmarking.org test page.
This is a test of EEMBC CoreMark processor benchmark. Learn more via the OpenBenchmarking.org test page.
Based on petehunt/rust-benchmark, this is a prime number benchmark that is multi-threaded and written in Rustlang. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Sysbench with CPU and memory sub-tests. Learn more via the OpenBenchmarking.org test page.
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test measures the RSA 4096-bit performance of OpenSSL. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i5-8400 (4 Cores), Motherboard: Microsoft Virtual Machine v7.0 (090008 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 1072 MB Microsoft, Disk: 32GB Virtual Disk, Graphics: llvmpipe 1GB
OS: CentOS Linux 7, Kernel: 3.10.0-1062.18.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 2.1 Mesa 18.3.4 (LLVM 7.0 256 bits), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 3840x1200, System Layer: microsoft
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Disk Notes: DEADLINE / attr2,inode64,noquota,relatime,rw,seclabel
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel) IBPB + tsx_async_abort: Not affected
Testing initiated at 23 April 2020 10:54 by user root.
Processor: Intel Core i5-9400F (4 Cores), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.0 BIOS), Memory: 10GB, Disk: 64GB Virtual Disk
OS: Clear Linux OS 29390, Kernel: 4.19.76-linuxkit (x86_64), Compiler: GCC 9.1.1 20190512 gcc-9-branch@271104 + Clang 8.0.0 + LLVM 8.0.0, File-System: overlayfs, System Layer: microsoft
Compiler Notes: --build=x86_64-generic-linux --disable-libmpx --disable-libunwind-exceptions --disable-multiarch --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-clocale=gnu --enable-default-pie --enable-gnu-indirect-function --enable-languages=c,c++,fortran,go --enable-ld=default --enable-libstdcxx-pch --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --exec-prefix=/usr --includedir=/usr/include --target=x86_64-generic-linux --with-arch=westmere --with-gcc-major-version-only --with-glibc-version=2.19 --with-gnu-ld --with-isl --with-ppl=yes --with-tune=haswell
Processor Notes: CPU Microcode: 0xffffffff
Disk Scheduler Notes: DEADLINE
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling
Testing initiated at 23 April 2020 10:44 by user root.
Processor: 2 x Intel Xeon E5620 @ 2.40GHz (8 Cores / 16 Threads), Motherboard: HP ProLiant DL380 G7 (P67 BIOS), Memory: 32GB, Disk: 1000GB LOGICAL VOLUME + 2000GB LOGICAL VOLUME, Graphics: radeondrmfb
OS: Clear Linux OS 29390, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Compiler: GCC 9.1.1 20190512 gcc-9-branch@271104 + Clang 8.0.0 + LLVM 8.0.0, File-System: xfs, Screen Resolution: 1024x768, System Layer: container-other
Compiler Notes: --build=x86_64-generic-linux --disable-libmpx --disable-libunwind-exceptions --disable-multiarch --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-clocale=gnu --enable-default-pie --enable-gnu-indirect-function --enable-languages=c,c++,fortran,go --enable-ld=default --enable-libstdcxx-pch --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --exec-prefix=/usr --includedir=/usr/include --target=x86_64-generic-linux --with-arch=westmere --with-gcc-major-version-only --with-glibc-version=2.19 --with-gnu-ld --with-isl --with-ppl=yes --with-tune=haswell
Disk Notes: DEADLINE / attr2,inode64,logbsize=128k,noquota,nouuid,relatime,rw,sunit=256,swidth=256
Processor Notes: Scaling Governor: pcc-cpufreq conservative - CPU Microcode: 0x1f
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + tsx_async_abort: Not affected
Testing initiated at 23 April 2020 13:59 by user root.
Processor: Intel Core i5-7400 @ 3.50GHz (4 Cores), Motherboard: ASUS PRIME B250M-PLUS (0607 BIOS), Memory: 8GB, Disk: 250GB Samsung SSD 850, Graphics: (1000MHz), Audio: Realtek ALC887-VD
OS: Clear Linux OS 29390, Kernel: 3.10.0-957.10.1.el7.x86_64 (x86_64), Compiler: GCC 9.1.1 20190512 gcc-9-branch@271104 + Clang 8.0.0 + LLVM 8.0.0, File-System: overlayfs, System Layer: container-other
Compiler Notes: --build=x86_64-generic-linux --disable-libmpx --disable-libunwind-exceptions --disable-multiarch --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-clocale=gnu --enable-default-pie --enable-gnu-indirect-function --enable-languages=c,c++,fortran,go --enable-ld=default --enable-libstdcxx-pch --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --exec-prefix=/usr --includedir=/usr/include --target=x86_64-generic-linux --with-arch=westmere --with-gcc-major-version-only --with-glibc-version=2.19 --with-gnu-ld --with-isl --with-ppl=yes --with-tune=haswell
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x8e
Disk Scheduler Notes: DEADLINE
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: SMT disabled L1D conditional cache flushes + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel)
Testing initiated at 24 April 2020 09:03 by user root.
Processor: 4 x AMD EPYC (with IBPB) (4 Cores), Motherboard: RDO OpenStack Compute (1.11.0-2.el7 BIOS), Memory: 4096MB, Disk: 50GB, Graphics: cirrusdrmfb
OS: Clear Linux OS 29390, Kernel: 3.10.0-1062.el7.x86_64 (x86_64), Compiler: GCC 9.1.1 20190512 gcc-9-branch@271104 + Clang 8.0.0 + LLVM 8.0.0, File-System: overlayfs, Screen Resolution: 1024x768, System Layer: container-other
Compiler Notes: --build=x86_64-generic-linux --disable-libmpx --disable-libunwind-exceptions --disable-multiarch --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-clocale=gnu --enable-default-pie --enable-gnu-indirect-function --enable-languages=c,c++,fortran,go --enable-ld=default --enable-libstdcxx-pch --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --exec-prefix=/usr --includedir=/usr/include --target=x86_64-generic-linux --with-arch=westmere --with-gcc-major-version-only --with-glibc-version=2.19 --with-gnu-ld --with-isl --with-ppl=yes --with-tune=haswell
Processor Notes: CPU Microcode: 0x1000065
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB
Testing initiated at 24 April 2020 09:38 by user root.
Processor: 4 x AMD EPYC (with IBPB) (4 Cores), Motherboard: RDO OpenStack Compute (1.11.0-2.el7 BIOS), Memory: 8GB, Disk: 197GB, Graphics: cirrusdrmfb
OS: Clear Linux OS 29390, Kernel: 3.10.0-1062.el7.x86_64 (x86_64), Compiler: GCC 9.1.1 20190512 gcc-9-branch@271104 + Clang 8.0.0 + LLVM 8.0.0, File-System: overlayfs, Screen Resolution: 1024x768, System Layer: container-other
Compiler Notes: --build=x86_64-generic-linux --disable-libmpx --disable-libunwind-exceptions --disable-multiarch --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-clocale=gnu --enable-default-pie --enable-gnu-indirect-function --enable-languages=c,c++,fortran,go --enable-ld=default --enable-libstdcxx-pch --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --exec-prefix=/usr --includedir=/usr/include --target=x86_64-generic-linux --with-arch=westmere --with-gcc-major-version-only --with-glibc-version=2.19 --with-gnu-ld --with-isl --with-ppl=yes --with-tune=haswell
Processor Notes: CPU Microcode: 0x1000065
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB
Testing initiated at 27 April 2020 10:02 by user root.
Processor: 4 x Intel Xeon (Cascadelake) (4 Cores), Motherboard: RDO OpenStack Compute (1.13.0-2.el8 BIOS), Memory: 32GB, Disk: 59GB, Graphics: cirrusdrmfb
OS: Ubuntu 20.04.1 LTS, Kernel: 3.10.0-1160.15.2.el7.x86_64 (x86_64), Display Driver: cirrusdrmfb, Compiler: GCC 9.3.0, File-System: overlayfs, Screen Resolution: 1024x768, System Layer: Docker
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-HskZEa/gcc-9-9.3.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT Host state unknown
Testing initiated at 15 March 2021 08:03 by user root.