lll
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of IBRS + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Processor: 4 x Intel Core i5-7400 (4 Cores), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.0 BIOS), Memory: 1926 MB + 1926 MB + 116 MB + 1808 MB + 1924 MB, Disk: 136GB Virtual Disk, Graphics: hyperv_drmdrmfb
OS: CentOS Linux 8, Kernel: 6.0.8-300.fc37.x86_64 (x86_64), Display Server: X Server, File-System: overlayfs, Screen Resolution: 1024x768, System Layer: microsoft
Intel MPI Benchmarks for stressing MPI implementations. At this point the test profile aggregates results for some common MPI functionality. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of the lightweight Nginx HTTP(S) web-server. This Nginx web server benchmark test profile makes use of the wrk program for facilitating the HTTP requests over a fixed period time with a configurable number of concurrent clients/connections. HTTPS with a self-signed OpenSSL certificate is used by this test for local benchmarking. Learn more via the OpenBenchmarking.org test page.
This test uses systemd-analyze to report the kernel boot time. Learn more via the OpenBenchmarking.org test page.
h: The test run did not produce a result.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of IBRS + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 23 November 2022 23:38 by user .
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of IBRS + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 23 November 2022 23:53 by user .
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of IBRS + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 23 November 2022 23:56 by user .
Processor: 4 x Intel Core i5-7400 (4 Cores), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.0 BIOS), Memory: 1926 MB + 1926 MB + 116 MB + 1808 MB + 1924 MB, Disk: 136GB Virtual Disk, Graphics: hyperv_drmdrmfb
OS: CentOS Linux 8, Kernel: 6.0.8-300.fc37.x86_64 (x86_64), Display Server: X Server, File-System: overlayfs, Screen Resolution: 1024x768, System Layer: microsoft
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of IBRS + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 24 November 2022 00:04 by user .