uvg266-base
Processor: 2 x Intel Xeon E5-2680 v3 @ 3.30GHz (24 Cores / 48 Threads), Motherboard: Dell 0CN7X8 (2.7.1 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 32GB, Disk: 480GB INTEL SSDSC2BB480G7R, Graphics: Matrox G200eR2, Monitor: SMS27A350H, Network: 4 x Broadcom NetXtreme BCM5720 PCIe
OS: Ubuntu 22.04, Kernel: 5.15.0-82-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server 1.18.4, Vulkan: 1.3.238, Compiler: Clang 18.0.0git + GCC 11.4.0, File-System: nfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: LDFLAGS=
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x49
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: 2 x Intel Xeon E5-2680 v3 @ 3.30GHz (24 Cores / 48 Threads), Motherboard: Dell 0CN7X8 (2.7.1 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 32GB, Disk: 480GB INTEL SSDSC2BB480G7R, Graphics: Matrox G200eR2, Monitor: SMS27A350H, Network: 4 x Broadcom NetXtreme BCM5720 PCIe
OS: Ubuntu 22.04, Kernel: 5.15.0-82-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server 1.18.4, Vulkan: 1.3.238, Compiler: Clang 18.0.0git + GCC 11.4.0, File-System: nfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: LDFLAGS=
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x49
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 6 June 2024 15:00 by user mciverj.