docker testing on Ubuntu 24.04 LTS via the Phoronix Test Suite.
Processor: Intel Core i7-6600U @ 3.40GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20K4S0EM00 (N1MET77W 1.62 BIOS), Memory: 16GB, Disk: 512GB SAMSUNG MZVLB512HAJQ-000L7 + 394GB SD400, Audio: Conexant CX8200
OS: Ubuntu 24.04 LTS, Kernel: 6.9.9-200.fc40.x86_64 (x86_64), Desktop: KDE Plasma, Display Server: Wayland, OpenGL: 4.6 Mesa 24.1.2, File-System: ext4, Screen Resolution: 1920x1080, System Layer: docker
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,m2,lto --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-multilib --enable-offload-defaulted --enable-offload-targets=nvptx-none,amdgcn-amdhsa --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-build-config=bootstrap-lto --with-gcc-major-version-only --with-libstdcxx-zoneinfo=/usr/share/zoneinfo --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_power) - CPU Microcode: 0xf0
Security Notes: SELinux + gather_data_sampling: Vulnerable: No microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS; IBPB: conditional; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of TSX disabled
iPerf is a network bandwidth throughput testing software. This test profile is used for automated testing of an iperf client and requires you have access to an iperf server. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-6600U @ 3.40GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20K4S0EM00 (N1MET77W 1.62 BIOS), Memory: 16GB, Disk: 512GB SAMSUNG MZVLB512HAJQ-000L7 + 394GB SD400, Audio: Conexant CX8200
OS: Ubuntu 24.04 LTS, Kernel: 6.9.9-200.fc40.x86_64 (x86_64), Desktop: KDE Plasma, Display Server: Wayland, OpenGL: 4.6 Mesa 24.1.2, File-System: ext4, Screen Resolution: 1920x1080, System Layer: docker
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,m2,lto --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-multilib --enable-offload-defaulted --enable-offload-targets=nvptx-none,amdgcn-amdhsa --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-build-config=bootstrap-lto --with-gcc-major-version-only --with-libstdcxx-zoneinfo=/usr/share/zoneinfo --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_power) - CPU Microcode: 0xf0
Security Notes: SELinux + gather_data_sampling: Vulnerable: No microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS; IBPB: conditional; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 19 July 2024 14:41 by user seriv.