Intel Core i7-10810U testing with a Dell 0F3R8H (1.4.3 BIOS) and Intel UHD 3GB on Ubuntu 20.04 via the Phoronix Test Suite.
Processor: Intel Xeon E3-1270 V2 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Intel DQ77MK (MKQ7710H.86A.0074.2018.1025.1727 BIOS), Chipset: Intel Xeon E3-1200 v2/Ivy, Memory: 32GB, Disk: 1000GB Western Digital WD10EAVS-00D, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 4GB (1340/1750MHz), Audio: Realtek ALC892, Monitor: DELL U2719D, Network: Intel 82579LM + Intel 82574L
OS: Ubuntu 20.04, Kernel: 5.8.0-45-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Ubuntu 20.04, Kernel: 5.8.0-48-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Opteron 4386 @ 3.10GHz (4 Cores / 8 Threads), Motherboard: ASUS KCMA-D8 v1.0 (4.8-1520-gb0c6cffb09 BIOS), Chipset: AMD RD890 + SB7x0/SB8x0/SB9x0, Memory: 32GB, Disk: 1000GB Western Digital WD10EAVS-00D, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 4GB, Audio: AMD SBx00 Azalia, Monitor: DELL U2719D, Network: 2 x Intel 82574L
Changed Memory to 16GB.
Changed Graphics to Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 4GB (1340/1750MHz).
Changed Graphics to Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 4GB.
Changed Processor to 2 x AMD Opteron 6386 SE @ 2.80GHz (16 Cores / 32 Threads).
Changed Motherboard to ASUS KGPE-D16 v1.0 (4.8-1520-gb0c6cffb09 BIOS).
Changed Memory to 126GB.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Processor: Intel Core i7-6820HQ @ 3.60GHz (4 Cores / 8 Threads), Motherboard: Dell 0N8J4R (1.15.0 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: PM951 NVMe SAMSUNG 1024GB, Graphics: NVIDIA Quadro M1000M 2GB (993/2505MHz), Audio: Realtek ALC3266, Network: Intel 8260
OS: Ubuntu 20.04, Kernel: 5.4.0-70-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, Display Driver: NVIDIA 450.102.04, OpenGL: 4.6.0, OpenCL: OpenCL 1.2 CUDA 11.0.228, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Changed Graphics to NVIDIA Quadro M1000M 2GB (1124/2505MHz).
Changed Graphics to NVIDIA Quadro M1000M 2GB (993/2505MHz).
Changed Graphics to NVIDIA Quadro M1000M 2GB (1124/2505MHz).
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=pci-0000_3b_00_0
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i7-10810U @ 4.90GHz (6 Cores / 12 Threads), Motherboard: Dell 0F3R8H (1.4.3 BIOS), Chipset: Intel Device 02ef, Memory: 32GB, Disk: PM981a NVMe Samsung 1024GB, Graphics: Intel UHD 3GB (1150MHz), Audio: Realtek ALC3204, Monitor: DELL U2719D, Network: Intel + Intel-AC 9462
OS: Ubuntu 20.04, Kernel: 5.8.0-48-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9 + Wayland, Display Driver: intel, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Processor: Intel Core i7-6820HQ @ 3.60GHz (4 Cores / 8 Threads), Motherboard: Dell 0N8J4R (1.15.0 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: PM951 NVMe SAMSUNG 1024GB, Graphics: NVIDIA Quadro M1000M 2GB (1124/2505MHz), Audio: Realtek ALC3266, Network: Intel 8260
OS: Ubuntu 20.04, Kernel: 5.4.0-70-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, Display Driver: NVIDIA 450.102.04, OpenGL: 4.6.0, OpenCL: OpenCL 1.2 CUDA 11.0.228, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=pci-0000_3b_00_0
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i7-10810U @ 4.90GHz (6 Cores / 12 Threads), Motherboard: Dell 0F3R8H (1.4.3 BIOS), Chipset: Intel Device 02ef, Memory: 32GB, Disk: PM981a NVMe Samsung 1024GB, Graphics: Intel UHD 3GB (1150MHz), Audio: Realtek ALC3204, Monitor: DELL U2719D, Network: Intel + Intel-AC 9462
OS: Ubuntu 20.04, Kernel: 5.8.0-48-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9 + Wayland, Display Driver: intel, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
OS: Ubuntu 20.04, Kernel: 5.8.0-48-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9 + Wayland, Display Driver: intel, OpenGL: 4.6 Mesa 20.2.6, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
A Steam-based test of the BioShock Infinite game. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of the Civilization VI game. The test profile assumes you have a Steam account, have Steam installed for the system, and that Civilization VI is available. This automates the process of executing the game and using a standardized benchmark. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Valve's Counter-Strike: Global Offensive game. The test profile assumes you have a Steam account, have Steam installed for the system, and that Counter-Strike: Global Offensive is already installed. This automates the process of executing the game and using a standardized time demo. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Deus Ex: Mankind Divided on Steam. The test profile assumes you have a Steam account, have Steam installed for the system, and that you own a copy of this game. This automates the process of executing the game and using its built-in benchmark mode. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of DiRT Rally on Steam. The test profile assumes you have a Steam account, have Steam installed for the system, and that you own a copy of this game. This automates the process of executing the game and using its built-in benchmark mode. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of DiRT Rally 2.0 running under Steam Play (Proton) on Linux. The test profile assumes you have a Steam account, have Steam installed for the system, and that the game is already purchased/installed. This automates the process of executing the game and using a standardized scene. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of DiRT Showdown on Steam. The test profile assumes you have a Steam account, have Steam installed for the system, and that you own a copy of this game. This automates the process of executing the game and using its built-in benchmark mode. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Valve's Dota 2 game. The test profile assumes you have a Steam account, have Steam installed for the system, and that you have rights to Dota 2. This automates the process of executing the game and using a standardized time demo. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of F1 2015 via Steam. The test profile assumes you have a Steam account, have Steam installed for the system, and that you have rights to F1 2015. This automates the process of executing the game and using a standardized time demo. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of F1 2018 running under Steam Play (Proton) on Linux. The test profile assumes you have a Steam account, have Steam installed for the system, and that the game is already purchased/installed. This automates the process of executing the game and using a standardized time demo. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Valve's Portal game. The test profile assumes you have a Steam account and have Steam installed for the system. This automates the process of executing the game and using a standardized time demo. Learn more via the OpenBenchmarking.org test page.
This is a test of SuperTuxKart, an open-source racing game. The engine, Antarctica, is a highly modified version of Irrlicht and uses OpenGL 3.1+. Bullet is used for physics. Sound is provided by OpenAL. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of the Tomb Raider (2013) game. The test profile assumes you have a Steam account, have Steam installed for the system, and that you own Tomb Raider. This automates the process of executing the game and using the built-in benchmark functionality. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Heaven demo for the Unigine engine. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Superposition demo for the Unigine engine, released in 2017. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Valley demo for the Unigine engine, released in February 2013. This engine is extremely demanding on the system's graphics card. Unigine Valley relies upon an OpenGL 3 core profile context. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon E3-1270 V2 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Intel DQ77MK (MKQ7710H.86A.0074.2018.1025.1727 BIOS), Chipset: Intel Xeon E3-1200 v2/Ivy, Memory: 32GB, Disk: 1000GB Western Digital WD10EAVS-00D, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 4GB (1340/1750MHz), Audio: Realtek ALC892, Monitor: DELL U2719D, Network: Intel 82579LM + Intel 82574L
OS: Ubuntu 20.04, Kernel: 5.8.0-45-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 26 March 2021 17:47 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 27 March 2021 12:35 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 27 March 2021 13:23 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 27 March 2021 14:32 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 27 March 2021 15:16 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 27 March 2021 15:46 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 27 March 2021 16:04 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 27 March 2021 17:58 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 27 March 2021 18:15 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 27 March 2021 21:09 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 27 March 2021 21:18 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 27 March 2021 21:38 by user administrator.
Processor: Intel Xeon E3-1270 V2 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Intel DQ77MK (MKQ7710H.86A.0074.2018.1025.1727 BIOS), Chipset: Intel Xeon E3-1200 v2/Ivy, Memory: 32GB, Disk: 1000GB Western Digital WD10EAVS-00D, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 4GB (1340/1750MHz), Audio: Realtek ALC892, Monitor: DELL U2719D, Network: Intel 82579LM + Intel 82574L
OS: Ubuntu 20.04, Kernel: 5.8.0-48-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 10:31 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 12:14 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 12:35 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 12:56 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 15:12 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 15:30 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 15:57 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 16:23 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 16:48 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 17:24 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 18:37 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 21:35 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 22:02 by user administrator.
Processor: AMD Opteron 4386 @ 3.10GHz (4 Cores / 8 Threads), Motherboard: ASUS KCMA-D8 v1.0 (4.8-1520-gb0c6cffb09 BIOS), Chipset: AMD RD890 + SB7x0/SB8x0/SB9x0, Memory: 32GB, Disk: 1000GB Western Digital WD10EAVS-00D, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 4GB, Audio: AMD SBx00 Azalia, Monitor: DELL U2719D, Network: 2 x Intel 82574L
OS: Ubuntu 20.04, Kernel: 5.8.0-48-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 29 March 2021 03:32 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 29 March 2021 20:56 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 29 March 2021 21:25 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 29 March 2021 21:43 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 29 March 2021 22:04 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 March 2021 11:09 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 March 2021 11:26 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 March 2021 12:11 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 March 2021 12:36 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 March 2021 12:55 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 March 2021 13:21 by user administrator.
Processor: AMD Opteron 4386 @ 3.10GHz (4 Cores / 8 Threads), Motherboard: ASUS KCMA-D8 v1.0 (4.8-1520-gb0c6cffb09 BIOS), Chipset: AMD RD890 + SB7x0/SB8x0/SB9x0, Memory: 16GB, Disk: 1000GB Western Digital WD10EAVS-00D, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 4GB (1340/1750MHz), Audio: AMD SBx00 Azalia, Monitor: DELL U2719D, Network: 2 x Intel 82574L
OS: Ubuntu 20.04, Kernel: 5.8.0-48-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 March 2021 13:33 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 March 2021 14:47 by user administrator.
Processor: AMD Opteron 4386 @ 3.10GHz (4 Cores / 8 Threads), Motherboard: ASUS KCMA-D8 v1.0 (4.8-1520-gb0c6cffb09 BIOS), Chipset: AMD RD890 + SB7x0/SB8x0/SB9x0, Memory: 16GB, Disk: 1000GB Western Digital WD10EAVS-00D, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 4GB, Audio: AMD SBx00 Azalia, Monitor: DELL U2719D, Network: 2 x Intel 82574L
OS: Ubuntu 20.04, Kernel: 5.8.0-48-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 March 2021 17:00 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 March 2021 20:16 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 March 2021 20:34 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 March 2021 20:57 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 March 2021 21:10 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 March 2021 21:31 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 March 2021 22:38 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 March 2021 23:06 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 1 April 2021 00:26 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 1 April 2021 00:36 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 1 April 2021 01:00 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 1 April 2021 01:29 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 1 April 2021 09:29 by user administrator.
Processor: 2 x AMD Opteron 6386 SE @ 2.80GHz (16 Cores / 32 Threads), Motherboard: ASUS KGPE-D16 v1.0 (4.8-1520-gb0c6cffb09 BIOS), Chipset: AMD RD890 + SB7x0/SB8x0/SB9x0, Memory: 126GB, Disk: 1000GB Western Digital WD10EAVS-00D, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 4GB, Audio: AMD SBx00 Azalia, Monitor: DELL U2719D, Network: 2 x Intel 82574L
OS: Ubuntu 20.04, Kernel: 5.8.0-48-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x6000852
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 1 April 2021 11:01 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 1 April 2021 18:36 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 1 April 2021 19:13 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 1 April 2021 19:44 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 2 April 2021 02:20 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 2 April 2021 12:51 by user administrator.
Processor: Intel Core i7-6820HQ @ 3.60GHz (4 Cores / 8 Threads), Motherboard: Dell 0N8J4R (1.15.0 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: PM951 NVMe SAMSUNG 1024GB, Graphics: NVIDIA Quadro M1000M 2GB (993/2505MHz), Audio: Realtek ALC3266, Network: Intel 8260
OS: Ubuntu 20.04, Kernel: 5.4.0-70-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, Display Driver: NVIDIA 450.102.04, OpenGL: 4.6.0, OpenCL: OpenCL 1.2 CUDA 11.0.228, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 2 April 2021 13:09 by user administrator.
Processor: Intel Core i7-6820HQ @ 3.60GHz (4 Cores / 8 Threads), Motherboard: Dell 0N8J4R (1.15.0 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: PM951 NVMe SAMSUNG 1024GB, Graphics: NVIDIA Quadro M1000M 2GB (1124/2505MHz), Audio: Realtek ALC3266, Network: Intel 8260
OS: Ubuntu 20.04, Kernel: 5.4.0-70-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, Display Driver: NVIDIA 450.102.04, OpenGL: 4.6.0, OpenCL: OpenCL 1.2 CUDA 11.0.228, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 2 April 2021 13:56 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 2 April 2021 14:56 by user administrator.
Processor: Intel Core i7-6820HQ @ 3.60GHz (4 Cores / 8 Threads), Motherboard: Dell 0N8J4R (1.15.0 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: PM951 NVMe SAMSUNG 1024GB, Graphics: NVIDIA Quadro M1000M 2GB (993/2505MHz), Audio: Realtek ALC3266, Network: Intel 8260
OS: Ubuntu 20.04, Kernel: 5.4.0-70-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, Display Driver: NVIDIA 450.102.04, OpenGL: 4.6.0, OpenCL: OpenCL 1.2 CUDA 11.0.228, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 2 April 2021 15:25 by user administrator.
Processor: Intel Core i7-6820HQ @ 3.60GHz (4 Cores / 8 Threads), Motherboard: Dell 0N8J4R (1.15.0 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: PM951 NVMe SAMSUNG 1024GB, Graphics: NVIDIA Quadro M1000M 2GB (1124/2505MHz), Audio: Realtek ALC3266, Network: Intel 8260
OS: Ubuntu 20.04, Kernel: 5.4.0-70-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, Display Driver: NVIDIA 450.102.04, OpenGL: 4.6.0, OpenCL: OpenCL 1.2 CUDA 11.0.228, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 2 April 2021 16:21 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=pci-0000_3b_00_0
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 April 2021 20:31 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=pci-0000_3b_00_0
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 April 2021 21:31 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=pci-0000_3b_00_0
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 April 2021 21:56 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=pci-0000_3b_00_0
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 April 2021 22:15 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=pci-0000_3b_00_0
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 April 2021 22:34 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=pci-0000_3b_00_0
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 April 2021 00:05 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=pci-0000_3b_00_0
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 April 2021 12:07 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=pci-0000_3b_00_0
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 April 2021 15:15 by user administrator.
Processor: Intel Core i7-10810U @ 4.90GHz (6 Cores / 12 Threads), Motherboard: Dell 0F3R8H (1.4.3 BIOS), Chipset: Intel Device 02ef, Memory: 32GB, Disk: PM981a NVMe Samsung 1024GB, Graphics: Intel UHD 3GB (1150MHz), Audio: Realtek ALC3204, Monitor: DELL U2719D, Network: Intel + Intel-AC 9462
OS: Ubuntu 20.04, Kernel: 5.8.0-48-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9 + Wayland, Display Driver: intel, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=pci-0000_3b_00_0
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 April 2021 17:16 by user administrator.
Processor: Intel Core i7-6820HQ @ 3.60GHz (4 Cores / 8 Threads), Motherboard: Dell 0N8J4R (1.15.0 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: PM951 NVMe SAMSUNG 1024GB, Graphics: NVIDIA Quadro M1000M 2GB (1124/2505MHz), Audio: Realtek ALC3266, Network: Intel 8260
OS: Ubuntu 20.04, Kernel: 5.4.0-70-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, Display Driver: NVIDIA 450.102.04, OpenGL: 4.6.0, OpenCL: OpenCL 1.2 CUDA 11.0.228, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 3 April 2021 18:25 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=pci-0000_3b_00_0
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 April 2021 20:06 by user administrator.
Processor: Intel Core i7-10810U @ 4.90GHz (6 Cores / 12 Threads), Motherboard: Dell 0F3R8H (1.4.3 BIOS), Chipset: Intel Device 02ef, Memory: 32GB, Disk: PM981a NVMe Samsung 1024GB, Graphics: Intel UHD 3GB (1150MHz), Audio: Realtek ALC3204, Monitor: DELL U2719D, Network: Intel + Intel-AC 9462
OS: Ubuntu 20.04, Kernel: 5.8.0-48-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9 + Wayland, Display Driver: intel, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=pci-0000_3b_00_0
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 April 2021 20:28 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 April 2021 23:31 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 4 April 2021 02:10 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 4 April 2021 05:14 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 4 April 2021 10:02 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 4 April 2021 10:13 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 4 April 2021 10:45 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 4 April 2021 10:59 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 4 April 2021 11:34 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 4 April 2021 11:57 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 4 April 2021 12:19 by user administrator.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 4 April 2021 12:48 by user administrator.
Processor: Intel Core i7-10810U @ 4.90GHz (6 Cores / 12 Threads), Motherboard: Dell 0F3R8H (1.4.3 BIOS), Chipset: Intel Device 02ef, Memory: 32GB, Disk: PM981a NVMe Samsung 1024GB, Graphics: Intel UHD 3GB (1150MHz), Audio: Realtek ALC3204, Monitor: DELL U2719D, Network: Intel + Intel-AC 9462
OS: Ubuntu 20.04, Kernel: 5.8.0-48-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9 + Wayland, Display Driver: intel, OpenGL: 4.6 Mesa 20.2.6, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 1.9.1
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 4 April 2021 13:45 by user administrator.