Docker testing on Ubuntu 20.04.6 LTS via the Phoronix Test Suite.
Processor: Intel Xeon Gold 6348 (2 Cores), Motherboard: QEMU CloudSigma (rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org BIOS), Memory: 6GB, Disk: 17GB
OS: Ubuntu 20.04.6 LTS, Kernel: 6.6.60-flatcar (x86_64), Compiler: GCC 9.4.0, File-System: overlayfs, System Layer: Docker
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xd000389
Java Notes: OpenJDK Runtime Environment (build 11.0.25+9-post-Ubuntu-1ubuntu120.04)
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT Host state unknown
Processor: Intel Xeon Gold 6348 (2 Cores), Motherboard: QEMU CloudSigma (rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org BIOS), Memory: 6GB, Disk: 17GB
OS: Ubuntu 20.04.6 LTS, Kernel: 6.6.60-flatcar (x86_64), Compiler: GCC 9.4.0, File-System: overlayfs, System Layer: Docker
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xd000389
Java Notes: OpenJDK Runtime Environment (build 11.0.25+9-post-Ubuntu-1ubuntu120.04)
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT Host state unknown
Testing initiated at 29 November 2024 18:34 by user root.