Intel Xeon E5-2699C v4 testing with a Dell 0K240Y (A29 BIOS) and NVIDIA Quadro K5000 4GB on openSUSE 20240329 via the Phoronix Test Suite.
Processor: Intel Xeon E5-2699C v4 @ 2.40GHz (22 Cores / 44 Threads), Motherboard: Dell 0K240Y (A29 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 128GB, Disk: 1920GB Toshiba MK001920GWHRU + 4001GB Western Digital WD40PURZ-85A, Graphics: NVIDIA Quadro K5000 4GB, Audio: Realtek ALC3220, Monitor: C24-40, Network: Intel I217-LM
OS: openSUSE 20240329, Kernel: 6.8.1-1-default (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 470.239.06, OpenGL: 4.6.0 NVIDIA 470.239.06, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23], File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-werror --enable-cet=auto --enable-checking=release --enable-gnu-indirect-function --enable-host-shared --enable-languages=c,c++,objc,fortran,obj-c++,ada,go,d,jit,m2 --enable-libphobos --enable-libstdcxx-allocator=new --enable-link-serialization --enable-linux-futex --enable-multilib --enable-offload-defaulted --enable-offload-targets=nvptx-none,amdgcn-amdhsa, --enable-plugin --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-build-config=bootstrap-lto-lean --with-gcc-major-version-only --with-libstdcxx-zoneinfo=/usr/share/zoneinfo --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind -O2 -O2 -O2 -O2 -O2 -Werror=return-type -Werror=return-type -Werror=return-type -Werror=return-type -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -funwind-tables -funwind-tables -funwind-tables -funwind-tables -funwind-tables -g' -g' -g' -g' -g'
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
OS: openSUSE 20240329, Kernel: 6.8.1-1-echo+ (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 470.239.06, OpenGL: 4.6.0 NVIDIA 470.239.06, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23], File-System: xfs, Screen Resolution: 1920x1080
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game for this open-source first person shooter title. Learn more via the OpenBenchmarking.org test page.
This test profile is of the combined time for the serial and parallel Mandelbrot sets written in Rustlang via willi-kappler/mandel-rust. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon E5-2699C v4 @ 2.40GHz (22 Cores / 44 Threads), Motherboard: Dell 0K240Y (A29 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 128GB, Disk: 1920GB Toshiba MK001920GWHRU + 4001GB Western Digital WD40PURZ-85A, Graphics: NVIDIA Quadro K5000 4GB, Audio: Realtek ALC3220, Monitor: C24-40, Network: Intel I217-LM
OS: openSUSE 20240329, Kernel: 6.8.1-1-default (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 470.239.06, OpenGL: 4.6.0 NVIDIA 470.239.06, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23], File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 17:10 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 18:55 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 19:04 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 19:44 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 19:52 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 19:56 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 20:35 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 20:49 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 20:57 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:01 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:03 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:11 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:14 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:21 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:24 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:27 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 1 April 2024 21:34 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 12:58 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 13:02 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 13:10 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-werror --enable-cet=auto --enable-checking=release --enable-gnu-indirect-function --enable-host-shared --enable-languages=c,c++,objc,fortran,obj-c++,ada,go,d,jit,m2 --enable-libphobos --enable-libstdcxx-allocator=new --enable-link-serialization --enable-linux-futex --enable-multilib --enable-offload-defaulted --enable-offload-targets=nvptx-none,amdgcn-amdhsa, --enable-plugin --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-build-config=bootstrap-lto-lean --with-gcc-major-version-only --with-libstdcxx-zoneinfo=/usr/share/zoneinfo --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind -O2 -O2 -O2 -O2 -O2 -Werror=return-type -Werror=return-type -Werror=return-type -Werror=return-type -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -fstack-clash-protection -funwind-tables -funwind-tables -funwind-tables -funwind-tables -funwind-tables -g' -g' -g' -g' -g'
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 13:55 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:26 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:38 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:40 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:44 by user hamad.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:50 by user hamad.
Processor: Intel Xeon E5-2699C v4 @ 2.40GHz (22 Cores / 44 Threads), Motherboard: Dell 0K240Y (A29 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 128GB, Disk: 1920GB Toshiba MK001920GWHRU + 4001GB Western Digital WD40PURZ-85A, Graphics: NVIDIA Quadro K5000 4GB, Audio: Realtek ALC3220, Monitor: C24-40, Network: Intel I217-LM
OS: openSUSE 20240329, Kernel: 6.8.1-1-echo+ (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 470.239.06, OpenGL: 4.6.0 NVIDIA 470.239.06, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23], File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS=-j44
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 80.04.ca.00.04
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2024 14:52 by user hamad.