kvm
Processor: 2 x Intel Xeon E5-2690 v2 @ 3.60GHz (20 Cores / 40 Threads), Motherboard: Dell 01XT2D (2.9.0 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 128GB, Disk: 3 x 1000GB SanDisk SSD G5 B + 2 x 1000GB BR 1TB + 2 x 2000GB Western Digital WD20SPZX-22U + 1000GB Western Digital WDS100T2B0A, Graphics: MSI NVIDIA GeForce GTX 1650, Audio: NVIDIA Device 10fa, Network: 4 x Broadcom NetXtreme BCM5720 PCIe
OS: Arch Linux, Kernel: 5.18.3-xanmod1-1-x64v2 (x86_64), Display Driver: NVIDIA, Compiler: GCC 12.1.0, File-System: zfs, Screen Resolution: 800x600, System Layer: lxc
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x42e
Disk Scheduler Notes: MQ-DEADLINE
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Processor: 2 x Intel Xeon E5-2690 v2 (20 Cores / 40 Threads), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (0.0.0 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 128GB, Disk: 108GB, Graphics: Red Hat Virtio GPU, Audio: QEMU Generic, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Arch Linux, Kernel: 5.18.3-arch1-1 (x86_64), Compiler: GCC 12.1.0, File-System: ext4, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Disk Notes: NONE / relatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x42e
Security Notes: itlb_multihit: Not affected + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
This is a test of the Apache HTTPD web server. This Apache HTTPD web server benchmark test profile makes use of the Golang "Bombardier" program for facilitating the HTTP requests over a fixed period time with a configurable number of concurrent clients. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of SQLite's speedtest1 benchmark program with an increased problem size of 1,000. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of the lightweight Nginx HTTP(S) web-server. This Nginx web server benchmark test profile relies upon nginx being present in the system PATH / already installed on the system if wanting to benchmark the operating system's provided nginx package. Use the pts/ngnx test profile if wanting to test a locally-built Nginx web server. Wrk is used for facilitating the HTTP web server load testing. Learn more via the OpenBenchmarking.org test page.
This is a test of core-latency, which measures the latency between all core combinations on the system processor(s). Reported is the average latency. Learn more via the OpenBenchmarking.org test page.
Aircrack-ng is a tool for assessing WiFi/WLAN network security. Learn more via the OpenBenchmarking.org test page.
This is a simple benchmark of SQLite. At present this test profile just measures the time to perform a pre-defined number of insertions on an indexed database. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon E5-2690 v2 @ 3.60GHz (20 Cores / 40 Threads), Motherboard: Dell 01XT2D (2.9.0 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 128GB, Disk: 3 x 1000GB SanDisk SSD G5 B + 2 x 1000GB BR 1TB + 2 x 2000GB Western Digital WD20SPZX-22U + 1000GB Western Digital WDS100T2B0A, Graphics: MSI NVIDIA GeForce GTX 1650, Audio: NVIDIA Device 10fa, Network: 4 x Broadcom NetXtreme BCM5720 PCIe
OS: Arch Linux, Kernel: 5.18.3-xanmod1-1-x64v2 (x86_64), Display Driver: NVIDIA, Compiler: GCC 12.1.0, File-System: zfs, Screen Resolution: 800x600, System Layer: lxc
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x42e
Disk Scheduler Notes: MQ-DEADLINE
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 June 2022 15:26 by user root.
Processor: 2 x Intel Xeon E5-2690 v2 (20 Cores / 40 Threads), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (0.0.0 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 128GB, Disk: 108GB, Graphics: Red Hat Virtio GPU, Audio: QEMU Generic, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Arch Linux, Kernel: 5.18.3-arch1-1 (x86_64), Compiler: GCC 12.1.0, File-System: ext4, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Disk Notes: NONE / relatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x42e
Security Notes: itlb_multihit: Not affected + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 June 2022 01:04 by user root.