Intel Xeon E5-2699C v4 testing with a Dell 0K240Y (A29 BIOS) and NVIDIA Quadro K5000 4GB on openSUSE 20240329 via the Phoronix Test Suite.
Processor: Intel Xeon E5-2699C v4 @ 2.40GHz (22 Cores / 44 Threads), Motherboard: Dell 0K240Y (A29 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 128GB, Disk: 1920GB Toshiba MK001920GWHRU + 4001GB Western Digital WD40PURZ-85A, Graphics: NVIDIA Quadro K5000 4GB, Audio: Realtek ALC3220, Monitor: C24-40, Network: Intel I217-LM
OS: openSUSE 20240329, Kernel: 6.8.1-1-default (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 470.239.06, OpenGL: 4.6.0 NVIDIA 470.239.06, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23], File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-werror --enable-cet=auto --enable-checking=release --enable-gnu-indirect-function --enable-host-shared --enable-languages=c,c++,objc,fortran,obj-c++,ada,go,d,jit,m2 --enable-libphobos --enable-libstdcxx-allocator=new --enable-link-serialization --enable-linux-futex --enable-multilib --enable-offload-defaulted --enable-offload-targets=nvptx-none,amdgcn-amdhsa, --enable-plugin --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-build-config=bootstrap-lto-lean --with-gcc-major-version-only --with-libstdcxx-zoneinfo=/usr/share/zoneinfo --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind -O2 -O2 -O2 -O2 -O2 -Werror=return-type -Werror=return-type -Werror=return-type -Werror=return-type -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -funwind-tables -funwind-tables -funwind-tables -funwind-tables -funwind-tables -g' -g' -g' -g' -g'
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
OS: openSUSE 20240329, Kernel: 6.8.1-1-echo+ (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 470.239.06, OpenGL: 4.6.0 NVIDIA 470.239.06, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23], File-System: xfs, Screen Resolution: 1920x1080
This test profile is of the combined time for the serial and parallel Mandelbrot sets written in Rustlang via willi-kappler/mandel-rust. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game for this open-source first person shooter title. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon E5-2699C v4 @ 2.40GHz (22 Cores / 44 Threads), Motherboard: Dell 0K240Y (A29 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 128GB, Disk: 1920GB Toshiba MK001920GWHRU + 4001GB Western Digital WD40PURZ-85A, Graphics: NVIDIA Quadro K5000 4GB, Audio: Realtek ALC3220, Monitor: C24-40, Network: Intel I217-LM
OS: openSUSE 20240329, Kernel: 6.8.1-1-default (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 470.239.06, OpenGL: 4.6.0 NVIDIA 470.239.06, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23], File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 17:10 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 18:55 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 19:04 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 19:44 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 19:52 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 19:56 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 20:35 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 20:49 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 20:57 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:01 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:03 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:11 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:14 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:21 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:24 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:27 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:34 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 12:58 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 13:02 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 13:10 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-werror --enable-cet=auto --enable-checking=release --enable-gnu-indirect-function --enable-host-shared --enable-languages=c,c++,objc,fortran,obj-c++,ada,go,d,jit,m2 --enable-libphobos --enable-libstdcxx-allocator=new --enable-link-serialization --enable-linux-futex --enable-multilib --enable-offload-defaulted --enable-offload-targets=nvptx-none,amdgcn-amdhsa, --enable-plugin --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-build-config=bootstrap-lto-lean --with-gcc-major-version-only --with-libstdcxx-zoneinfo=/usr/share/zoneinfo --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind -O2 -O2 -O2 -O2 -O2 -Werror=return-type -Werror=return-type -Werror=return-type -Werror=return-type -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -funwind-tables -funwind-tables -funwind-tables -funwind-tables -funwind-tables -g' -g' -g' -g' -g'
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 13:55 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:26 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:38 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:40 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:44 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:50 by user hamad.
Processor: Intel Xeon E5-2699C v4 @ 2.40GHz (22 Cores / 44 Threads), Motherboard: Dell 0K240Y (A29 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 128GB, Disk: 1920GB Toshiba MK001920GWHRU + 4001GB Western Digital WD40PURZ-85A, Graphics: NVIDIA Quadro K5000 4GB, Audio: Realtek ALC3220, Monitor: C24-40, Network: Intel I217-LM
OS: openSUSE 20240329, Kernel: 6.8.1-1-echo+ (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 470.239.06, OpenGL: 4.6.0 NVIDIA 470.239.06, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23], File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:52 by user hamad.