defaultvsecho
Intel Xeon E5-2699C v4 testing with a Dell 0K240Y (A29 BIOS) and NVIDIA Quadro K5000 4GB on openSUSE 20240329 via the Phoronix Test Suite.
default
Processor: Intel Xeon E5-2699C v4 @ 2.40GHz (22 Cores / 44 Threads), Motherboard: Dell 0K240Y (A29 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 128GB, Disk: 1920GB Toshiba MK001920GWHRU + 4001GB Western Digital WD40PURZ-85A, Graphics: NVIDIA Quadro K5000 4GB, Audio: Realtek ALC3220, Monitor: C24-40, Network: Intel I217-LM
OS: openSUSE 20240329, Kernel: 6.8.1-1-default (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 470.239.06, OpenGL: 4.6.0 NVIDIA 470.239.06, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23], File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
echo
echo1
echo6ms
echo16us
echo7us
echo1us
echo100ns
echo500ns
echo250ns
echo750ns
echo625ns
echo375ns
echo438ns
echo562ns
echo500ns_r2
echo500ns_r3
echo6us
echo3us
echo10us
echo105us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-werror --enable-cet=auto --enable-checking=release --enable-gnu-indirect-function --enable-host-shared --enable-languages=c,c++,objc,fortran,obj-c++,ada,go,d,jit,m2 --enable-libphobos --enable-libstdcxx-allocator=new --enable-link-serialization --enable-linux-futex --enable-multilib --enable-offload-defaulted --enable-offload-targets=nvptx-none,amdgcn-amdhsa, --enable-plugin --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-build-config=bootstrap-lto-lean --with-gcc-major-version-only --with-libstdcxx-zoneinfo=/usr/share/zoneinfo --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind -O2 -O2 -O2 -O2 -O2 -Werror=return-type -Werror=return-type -Werror=return-type -Werror=return-type -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -funwind-tables -funwind-tables -funwind-tables -funwind-tables -funwind-tables -g' -g' -g' -g' -g'
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
echo35us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
echo26us
echo32us
echo40us
echo30us
echo35us_r2
OS: openSUSE 20240329, Kernel: 6.8.1-1-echo+ (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 470.239.06, OpenGL: 4.6.0 NVIDIA 470.239.06, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23], File-System: xfs, Screen Resolution: 1920x1080
Xonotic
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game for this open-source first person shooter title. Learn more via the OpenBenchmarking.org test page.
Rust Mandelbrot
This test profile is of the combined time for the serial and parallel Mandelbrot sets written in Rustlang via willi-kappler/mandel-rust. Learn more via the OpenBenchmarking.org test page.
OpenArena
default
Processor: Intel Xeon E5-2699C v4 @ 2.40GHz (22 Cores / 44 Threads), Motherboard: Dell 0K240Y (A29 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 128GB, Disk: 1920GB Toshiba MK001920GWHRU + 4001GB Western Digital WD40PURZ-85A, Graphics: NVIDIA Quadro K5000 4GB, Audio: Realtek ALC3220, Monitor: C24-40, Network: Intel I217-LM
OS: openSUSE 20240329, Kernel: 6.8.1-1-default (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 470.239.06, OpenGL: 4.6.0 NVIDIA 470.239.06, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23], File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 17:10 by user hamad.
echo
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 18:55 by user hamad.
echo1
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 19:04 by user hamad.
echo6ms
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 19:44 by user hamad.
echo16us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 19:52 by user hamad.
echo7us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 19:56 by user hamad.
echo1us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 20:35 by user hamad.
echo100ns
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 20:49 by user hamad.
echo500ns
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 20:57 by user hamad.
echo250ns
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:01 by user hamad.
echo750ns
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:03 by user hamad.
echo625ns
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:11 by user hamad.
echo375ns
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:14 by user hamad.
echo438ns
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:21 by user hamad.
echo562ns
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:24 by user hamad.
echo500ns_r2
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:27 by user hamad.
echo500ns_r3
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:34 by user hamad.
echo6us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 12:58 by user hamad.
echo3us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 13:02 by user hamad.
echo10us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 13:10 by user hamad.
echo105us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-werror --enable-cet=auto --enable-checking=release --enable-gnu-indirect-function --enable-host-shared --enable-languages=c,c++,objc,fortran,obj-c++,ada,go,d,jit,m2 --enable-libphobos --enable-libstdcxx-allocator=new --enable-link-serialization --enable-linux-futex --enable-multilib --enable-offload-defaulted --enable-offload-targets=nvptx-none,amdgcn-amdhsa, --enable-plugin --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-build-config=bootstrap-lto-lean --with-gcc-major-version-only --with-libstdcxx-zoneinfo=/usr/share/zoneinfo --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind -O2 -O2 -O2 -O2 -O2 -Werror=return-type -Werror=return-type -Werror=return-type -Werror=return-type -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -funwind-tables -funwind-tables -funwind-tables -funwind-tables -funwind-tables -g' -g' -g' -g' -g'
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 13:55 by user hamad.
echo35us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:26 by user hamad.
echo26us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:38 by user hamad.
echo32us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:40 by user hamad.
echo40us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:44 by user hamad.
echo30us
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:50 by user hamad.
echo35us_r2
Processor: Intel Xeon E5-2699C v4 @ 2.40GHz (22 Cores / 44 Threads), Motherboard: Dell 0K240Y (A29 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 128GB, Disk: 1920GB Toshiba MK001920GWHRU + 4001GB Western Digital WD40PURZ-85A, Graphics: NVIDIA Quadro K5000 4GB, Audio: Realtek ALC3220, Monitor: C24-40, Network: Intel I217-LM
OS: openSUSE 20240329, Kernel: 6.8.1-1-echo+ (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 470.239.06, OpenGL: 4.6.0 NVIDIA 470.239.06, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23], File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:52 by user hamad.