compilebench-ext4-btrfs-xfs-zfs
VMware testing on Ubuntu 20.04 via the Phoronix Test Suite.
zfs vNVMe
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB VMware Virtual NVMe Disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x43
Disk Scheduler Notes: NONE
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
ext4 vNVMe
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / noatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
btrfs vNVMe
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: btrfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / noatime,rw,space_cache,ssd,subvol=/,subvolid=5 / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
xfs vNVMe
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: xfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / attr2,inode64,logbsize=32k,logbufs=8,noatime,rw,usrquota / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
zfs pvSCSI
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x43
Disk Scheduler Notes: MQ-DEADLINE
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
ext4 pvSCSI
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / noatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
btrfs pvSCSI
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: btrfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / noatime,rw,space_cache,ssd,subvol=/,subvolid=5 / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
xfs pvSCSI
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: xfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noatime,rw,usrquota / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
ds_test_i980_3
Processor: 2 x Intel Xeon Gold 6258R (112 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 474GB, Disk: 172GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.11.0-34-generic (x86_64), Vulkan: 1.0.2, Compiler: GCC 9.3.0 + Clang 10.0.0-4ubuntu1, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / relatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x5003005
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
ds_test_i980_32C_160GB
Changed Processor to 2 x Intel Xeon Gold 6258R (32 Cores).
Changed Memory to 158GB.
Compile Bench
Compilebench tries to age a filesystem by simulating some of the disk IO common in creating, compiling, patching, stating and reading kernel trees. It indirectly measures how well filesystems can maintain directory locality as the disk fills up and directories age. This current test is setup to use the makej mode with 10 initial directories Learn more via the OpenBenchmarking.org test page.
zfs vNVMe
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB VMware Virtual NVMe Disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x43
Disk Scheduler Notes: NONE
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 July 2021 23:36 by user common.
ext4 vNVMe
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB VMware Virtual NVMe Disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / noatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 July 2021 23:58 by user common.
btrfs vNVMe
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB VMware Virtual NVMe Disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: btrfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / noatime,rw,space_cache,ssd,subvol=/,subvolid=5 / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 July 2021 00:10 by user common.
xfs vNVMe
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB VMware Virtual NVMe Disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: xfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / attr2,inode64,logbsize=32k,logbufs=8,noatime,rw,usrquota / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 July 2021 00:13 by user common.
zfs pvSCSI
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x43
Disk Scheduler Notes: MQ-DEADLINE
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 July 2021 00:54 by user common.
ext4 pvSCSI
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / noatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 July 2021 00:59 by user common.
btrfs pvSCSI
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: btrfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / noatime,rw,space_cache,ssd,subvol=/,subvolid=5 / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 July 2021 01:09 by user common.
xfs pvSCSI
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: xfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noatime,rw,usrquota / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 July 2021 01:13 by user common.
ds_test_i980_3
Processor: 2 x Intel Xeon Gold 6258R (112 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 474GB, Disk: 172GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.11.0-34-generic (x86_64), Vulkan: 1.0.2, Compiler: GCC 9.3.0 + Clang 10.0.0-4ubuntu1, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / relatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x5003005
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 September 2021 19:22 by user mecel.
ds_test_i980_32C_160GB
Processor: 2 x Intel Xeon Gold 6258R (32 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 172GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.11.0-34-generic (x86_64), Vulkan: 1.0.2, Compiler: GCC 9.3.0 + Clang 10.0.0-4ubuntu1, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / relatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x5003005
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 September 2021 05:22 by user mecel.