KVM testing on Ubuntu 22.04 via the Phoronix Test Suite.
Processor: Intel Xeon Gold 6248R (1 Core / 2 Threads), Motherboard: OpenStack Foundation Nova v20.6.1 (1.16.0-4.module_el8+603+e0ca2c01 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 7680 MB RAM, Disk: 54GB QEMU HDD + 83GB QEMU HDD, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: Ubuntu 22.04, Kernel: 5.15.0-91-generic (x86_64), Vulkan: 1.3.255, Compiler: GCC 11.4.0, File-System: ext4, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x5003501
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Processor: Intel Xeon Gold 6248R (1 Core / 2 Threads), Motherboard: OpenStack Foundation Nova v20.6.1 (1.16.0-4.module_el8+603+e0ca2c01 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 7680 MB RAM, Disk: 54GB QEMU HDD + 83GB QEMU HDD, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: Ubuntu 22.04, Kernel: 5.15.0-91-generic (x86_64), Vulkan: 1.3.255, Compiler: GCC 11.4.0, File-System: ext4, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x5003501
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 13 December 2024 23:56 by user root.