virgl-track-perf-regression
QEMU testing on Gentoo 2.8 via the Phoronix Test Suite.
good
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
real-good
master-tot
step-1-23d356
step-2-4f2667ff
step-3-2f7f7463
step-4-02ea084e
step-5-dc6f2f0d
confirm
test-fd
retest-best
retest-worst
master-again
fixed-sysval-v1
fixed-sysval-v1b
fixed-sysval-v1b-2
fixes-sysval-v2
fixes-sysval-v3
test-v3-plus-direct-state-access
Processor: 8 x QEMU Virtual 2.5+ (8 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 32GB, Disk: 97GB, Graphics: Red Hat Virtio GPU 12288GB, Audio: Intel 82801I, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Gentoo 2.8, Kernel: 5.15.52-gentoo-x86_64 (x86_64), Display Server: X Server 1.21.1.3, OpenGL: 4.3 Mesa 22.3.0-devel (git-50802f96a8) (LLVM 14.0.4 DRM 3.42...), Compiler: GCC 11.3.0 + LLVM 14.0.4, File-System: ext4, Screen Resolution: 1024x768, System Layer: QEMU
Unigine Sanctuary
This test calculates the average frame-rate within the Sanctuary demo for the Unigine engine. This engine is very demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
good
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 August 2022 15:48 by user gerddie.
real-good
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 August 2022 16:00 by user gerddie.
master-tot
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 August 2022 16:11 by user gerddie.
step-1-23d356
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 August 2022 16:23 by user gerddie.
step-2-4f2667ff
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 August 2022 16:34 by user gerddie.
step-3-2f7f7463
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 August 2022 17:13 by user gerddie.
step-4-02ea084e
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 August 2022 17:24 by user gerddie.
step-5-dc6f2f0d
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 August 2022 17:37 by user gerddie.
confirm
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 August 2022 17:55 by user gerddie.
test-fd
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 August 2022 18:18 by user gerddie.
retest-best
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 August 2022 18:31 by user gerddie.
retest-worst
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 August 2022 18:49 by user gerddie.
master-again
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 August 2022 09:04 by user gerddie.
fixed-sysval-v1
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 August 2022 09:59 by user gerddie.
fixed-sysval-v1b
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 August 2022 10:01 by user gerddie.
fixed-sysval-v1b-2
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 August 2022 10:13 by user gerddie.
fixes-sysval-v2
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 August 2022 10:53 by user gerddie.
fixes-sysval-v3
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 August 2022 11:21 by user gerddie.
test-v3-plus-direct-state-access
Processor: 8 x QEMU Virtual 2.5+ (8 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 32GB, Disk: 97GB, Graphics: Red Hat Virtio GPU 12288GB, Audio: Intel 82801I, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Gentoo 2.8, Kernel: 5.15.52-gentoo-x86_64 (x86_64), Display Server: X Server 1.21.1.3, OpenGL: 4.3 Mesa 22.3.0-devel (git-50802f96a8) (LLVM 14.0.4 DRM 3.42...), Compiler: GCC 11.3.0 + LLVM 14.0.4, File-System: ext4, Screen Resolution: 1024x768, System Layer: QEMU
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 August 2022 17:25 by user gerddie.