Docker testing on Ubuntu 20.04.4 LTS via the Phoronix Test Suite.
Processor: 4 x Intel Core (Haswell no TSX IBRS) (4 Cores), Motherboard: OpenStack Foundation Nova v21.2.4 (1.10.2-1ubuntu1 BIOS), Memory: 8GB, Disk: 20GB, Graphics: cirrusdrmfb
OS: Ubuntu 20.04.4 LTS, Kernel: 5.10.0-17-amd64 (x86_64), Compiler: GCC 9.4.0, File-System: overlayfs, Screen Resolution: 1024x768, System Layer: Docker
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1
Java Notes: OpenJDK Runtime Environment (build 11.0.16+8-post-Ubuntu-0ubuntu120.04)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
This test runs the Java version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This benchmark is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
Processor: 4 x Intel Core (Haswell no TSX IBRS) (4 Cores), Motherboard: OpenStack Foundation Nova v21.2.4 (1.10.2-1ubuntu1 BIOS), Memory: 8GB, Disk: 20GB, Graphics: cirrusdrmfb
OS: Ubuntu 20.04.4 LTS, Kernel: 5.10.0-17-amd64 (x86_64), Compiler: GCC 9.4.0, File-System: overlayfs, Screen Resolution: 1024x768, System Layer: Docker
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1
Java Notes: OpenJDK Runtime Environment (build 11.0.16+8-post-Ubuntu-0ubuntu120.04)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 30 August 2022 12:53 by user root.