KVM testing on openSUSE Tumbleweed 20241107 via the Phoronix Test Suite.
Processor: 4 x AMD Ryzen 5 5600H (4 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 8GB, Disk: 148GB, Graphics: virgl 2048GB, Audio: QEMU Generic, Monitor: QEMU Monitor, Network: Red Hat Virtio 1.0 device
OS: openSUSE Tumbleweed 20241107, Kernel: 6.11.6-2-default (x86_64), Desktop: KDE Plasma 6.2.3, Display Server: X Server 1.21.1.14, OpenGL: 4.3 Mesa 24.1.7 (LLVM 18.1.8 ...), File-System: btrfs, Screen Resolution: 2560x1600, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xa50000f
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: 4 x AMD Ryzen 5 5600H (4 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 8GB, Disk: 148GB, Graphics: virgl 2048GB, Audio: QEMU Generic, Monitor: QEMU Monitor, Network: Red Hat Virtio 1.0 device
OS: openSUSE Tumbleweed 20241107, Kernel: 6.11.6-2-default (x86_64), Desktop: KDE Plasma 6.2.3, Display Server: X Server 1.21.1.14, OpenGL: 4.3 Mesa 24.1.7 (LLVM 18.1.8 ...), File-System: btrfs, Screen Resolution: 2560x1600, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xa50000f
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 9 November 2024 23:47 by user lunaweed.