KVM testing on Ubuntu 20.04 via the Phoronix Test Suite.
Processor: 4 x AMD EPYC (with IBPB) (4 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (1.15.0-1 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 8192 MB RAM QEMU, Disk: 54GB QEMU HDD, Graphics: Tesla V100-PCIE-16GB, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 20.04, Kernel: 5.4.0-167-generic (x86_64), Display Driver: NVIDIA, OpenCL: OpenCL 3.0 CUDA 12.2.147, Compiler: GCC 9.4.0 + CUDA 10.1, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1000065
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Darktable is an open-source photography / workflow application this will use any system-installed Darktable program or on Windows will automatically download the pre-built binary from the project. Learn more via the OpenBenchmarking.org test page.
Processor: 4 x AMD EPYC (with IBPB) (4 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (1.15.0-1 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 8192 MB RAM QEMU, Disk: 54GB QEMU HDD, Graphics: Tesla V100-PCIE-16GB, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 20.04, Kernel: 5.4.0-167-generic (x86_64), Display Driver: NVIDIA, OpenCL: OpenCL 3.0 CUDA 12.2.147, Compiler: GCC 9.4.0 + CUDA 10.1, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1000065
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 November 2023 18:42 by user root.