KVM testing on Rocky Linux 8.10 via the Phoronix Test Suite.
Processor: 2 x AMD EPYC-Milan (2 Cores), Motherboard: Red Hat KVM RHEL-AV (1.16.0-4.module+el8.9.0+1408+7b966129 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 8GB, Disk: 20GB, Network: Red Hat Virtio 1.0 device
OS: Rocky Linux 8.10, Kernel: 4.18.0-553.el8_10.x86_64 (x86_64), Compiler: GCC 8.5.0 20210514, File-System: xfs, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1000065
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Smallpt is a C++ global illumination renderer written in less than 100 lines of code. Global illumination is done via unbiased Monte Carlo path tracing and there is multi-threading support via the OpenMP library. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x AMD EPYC-Milan (2 Cores), Motherboard: Red Hat KVM RHEL-AV (1.16.0-4.module+el8.9.0+1408+7b966129 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 8GB, Disk: 20GB, Network: Red Hat Virtio 1.0 device
OS: Rocky Linux 8.10, Kernel: 4.18.0-553.el8_10.x86_64 (x86_64), Compiler: GCC 8.5.0 20210514, File-System: xfs, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1000065
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 9 September 2024 16:54 by user .