8171M Hyper-V vServer with CPU extender enabled
Processor: 2 x Intel Xeon Platinum 8171M (52 Cores), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.0 BIOS), Memory: 40GB, Disk: 550GB Virtual Disk, Graphics: hyperv_fb
OS: Ubuntu 20.04, Kernel: 5.4.0-173-generic (x86_64), Compiler: GCC 9.4.0 + Clang 10.0.0-4ubuntu1, File-System: ext4, Screen Resolution: 1152x864, System Layer: microsoft
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-9QDOt0/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT Host state unknown + meltdown: Vulnerable + mmio_stale_data: Vulnerable + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Processor: 2 x Intel Xeon Platinum 8171M (52 Cores / 104 Threads), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.1 BIOS), Memory: 16GB, Disk: 550GB Virtual Disk, Graphics: hyperv_fb
OS: Ubuntu 20.04.6 LTS, Kernel: 5.4.0-196-generic (x86_64), Compiler: GCC 9.4.0 + Clang 10.0.0-4ubuntu1, File-System: ext4, Screen Resolution: 1152x864, System Layer: microsoft
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-9QDOt0/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT Host state unknown + meltdown: Vulnerable + mmio_stale_data: Vulnerable + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Vulnerable + srbds: Not affected + tsx_async_abort: Vulnerable
This test times how long it takes to build the Linux kernel in a default configuration (defconfig) for the architecture being tested or alternatively an allmodconfig for building all possible kernel modules for the build. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon Platinum 8171M (52 Cores), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.0 BIOS), Memory: 40GB, Disk: 550GB Virtual Disk, Graphics: hyperv_fb
OS: Ubuntu 20.04, Kernel: 5.4.0-173-generic (x86_64), Compiler: GCC 9.4.0 + Clang 10.0.0-4ubuntu1, File-System: ext4, Screen Resolution: 1152x864, System Layer: microsoft
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-9QDOt0/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT Host state unknown + meltdown: Vulnerable + mmio_stale_data: Vulnerable + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 9 March 2024 11:50 by user ldl.
Processor: 2 x Intel Xeon Platinum 8171M (52 Cores / 104 Threads), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.1 BIOS), Memory: 16GB, Disk: 550GB Virtual Disk, Graphics: hyperv_fb
OS: Ubuntu 20.04.6 LTS, Kernel: 5.4.0-196-generic (x86_64), Compiler: GCC 9.4.0 + Clang 10.0.0-4ubuntu1, File-System: ext4, Screen Resolution: 1152x864, System Layer: microsoft
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-9QDOt0/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT Host state unknown + meltdown: Vulnerable + mmio_stale_data: Vulnerable + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Vulnerable + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 29 November 2024 13:19 by user ldl.