KVM testing on Gentoo Linux 2.15 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/13 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13 --disable-dependency-tracking --disable-fixed-point --disable-fixincludes --disable-libada --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-libvtv --disable-silent-rules --disable-systemtap --disable-valgrind-annotations --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-cet --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/13/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13/man --with-build-config=bootstrap-cet --with-gcc-major-version-only --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/13/python --with-zstd --without-isl
Processor Notes: CPU Microcode: 0xa601203
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: 8 x AMD Ryzen 7 7800X3D 8-Core (8 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 8GB, Disk: 15GB, Graphics: Red Hat Virtio 1.0 GPU, Audio: QEMU Generic, Monitor: QEMU Monitor, Network: Red Hat Virtio 1.0 device
OS: Gentoo Linux 2.15, Kernel: 6.6.28-gentoo-dist (x86_64), Compiler: GCC 13.2.1 20240210, File-System: ext4, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/13 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13 --disable-dependency-tracking --disable-fixed-point --disable-fixincludes --disable-libada --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-libvtv --disable-silent-rules --disable-systemtap --disable-valgrind-annotations --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-cet --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/13/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13/man --with-build-config='bootstrap-lto --with-gcc-major-version-only --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/13/python --with-zstd --without-isl
Processor Notes: CPU Microcode: 0xa601203
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: 8 x AMD Ryzen 7 7800X3D 8-Core (8 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 8GB, Disk: 29GB, Graphics: Red Hat Virtio 1.0 GPU, Audio: QEMU Generic, Monitor: QEMU Monitor, Network: Red Hat Virtio 1.0 device
OS: Gentoo Linux 2.15, Kernel: 6.6.30-gentoo (x86_64), Compiler: GCC 13.2.1 20240210, File-System: ext4, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/13 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13 --disable-dependency-tracking --disable-fixed-point --disable-fixincludes --disable-libada --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-libvtv --disable-silent-rules --disable-systemtap --disable-valgrind-annotations --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-cet --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/13/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13/man --with-build-config=bootstrap-cet --with-gcc-major-version-only --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/13/python --with-zstd --without-isl
Processor Notes: CPU Microcode: 0xa601203
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 6 May 2024 03:23 by user gamer.
Processor: 8 x AMD Ryzen 7 7800X3D 8-Core (8 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 8GB, Disk: 15GB, Graphics: Red Hat Virtio 1.0 GPU, Audio: QEMU Generic, Monitor: QEMU Monitor, Network: Red Hat Virtio 1.0 device
OS: Gentoo Linux 2.15, Kernel: 6.6.28-gentoo-dist (x86_64), Compiler: GCC 13.2.1 20240210, File-System: ext4, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/13 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13 --disable-dependency-tracking --disable-fixed-point --disable-fixincludes --disable-libada --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-libvtv --disable-silent-rules --disable-systemtap --disable-valgrind-annotations --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-cet --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/13/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13/man --with-build-config=bootstrap-cet --with-gcc-major-version-only --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/13/python --with-zstd --without-isl
Processor Notes: CPU Microcode: 0xa601203
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 6 May 2024 16:26 by user gamer.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/13 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13 --disable-dependency-tracking --disable-fixed-point --disable-fixincludes --disable-libada --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-libvtv --disable-silent-rules --disable-systemtap --disable-valgrind-annotations --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-cet --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/13/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13/man --with-build-config='bootstrap-lto --with-gcc-major-version-only --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/13/python --with-zstd --without-isl
Processor Notes: CPU Microcode: 0xa601203
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 8 May 2024 16:52 by user gamer.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/13 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13 --disable-dependency-tracking --disable-fixed-point --disable-fixincludes --disable-libada --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-libvtv --disable-silent-rules --disable-systemtap --disable-valgrind-annotations --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-cet --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/13/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13/man --with-build-config='bootstrap-lto --with-gcc-major-version-only --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/13/python --with-zstd --without-isl
Processor Notes: CPU Microcode: 0xa601203
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 8 May 2024 20:03 by user gamer.
Processor: 8 x AMD Ryzen 7 7800X3D 8-Core (8 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 8GB, Disk: 29GB, Graphics: Red Hat Virtio 1.0 GPU, Audio: QEMU Generic, Monitor: QEMU Monitor, Network: Red Hat Virtio 1.0 device
OS: Gentoo Linux 2.15, Kernel: 6.6.30-gentoo (x86_64), Compiler: GCC 13.2.1 20240210, File-System: ext4, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/13 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13 --disable-dependency-tracking --disable-fixed-point --disable-fixincludes --disable-libada --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-libvtv --disable-silent-rules --disable-systemtap --disable-valgrind-annotations --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-cet --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/13/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/13/man --with-build-config='bootstrap-lto --with-gcc-major-version-only --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/13/python --with-zstd --without-isl
Processor Notes: CPU Microcode: 0xa601203
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 9 May 2024 13:48 by user gamer.