Oracle VirtualBox testing on Fedora Linux 40 via the Phoronix Test Suite.
Processor: AMD 3020e (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 3584MB, Disk: 33GB VBOX HDD, Graphics: llvmpipe, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Fedora Linux 40, Kernel: 6.8.5-301.fc40.x86_64 (x86_64), Desktop: GNOME Shell 46.0, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 24.0.5 (LLVM 18.1.1 128 bits), File-System: btrfs, Screen Resolution: 1280x800, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Mitigation of untrained return thunk; SMT disabled + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD 3020e (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 3584MB, Disk: 33GB VBOX HDD, Graphics: llvmpipe, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Fedora Linux 40, Kernel: 6.8.5-301.fc40.x86_64 (x86_64), Desktop: GNOME Shell 46.0, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 24.0.5 (LLVM 18.1.1 128 bits), File-System: btrfs, Screen Resolution: 1280x800, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Mitigation of untrained return thunk; SMT disabled + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 August 2024 18:16 by user zander.