VMware testing on Fedora Linux 40 via the Phoronix Test Suite.
Processor: Intel Core i5-13500 (12 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (4.2023.08-4 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 32GB, Disk: 245GB QEMU HDD, Audio: Intel 82801I, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Fedora 40, Kernel: 6.8.5-301.fc40.x86_64 (x86_64), Desktop: GNOME Shell 46.0, Display Server: X Server, Compiler: GCC 14.2.1 20240801, File-System: btrfs, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x35
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Vulnerable: No microcode + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i5-13500 (6 Cores / 12 Threads), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.1 BIOS), Memory: 16GB, Disk: 268GB Virtual Disk
OS: Fedora Linux 40, Kernel: 6.10.6-200.fc40.x86_64 (x86_64), Desktop: GNOME Shell 46.4, Display Server: X Server, Compiler: GCC 14.2.1 20240801, File-System: btrfs, System Layer: microsoft
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Vulnerable: No microcode + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i5-13500 (6 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 32GB, Disk: 129GB Virtual disk, Graphics: llvmpipe, Network: Intel 82545EM
OS: Fedora Linux 40, Kernel: 6.8.5-301.fc40.x86_64 (x86_64), Desktop: GNOME Shell 46.0, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 24.0.5 (LLVM 18.1.1 256 bits), Compiler: GCC 14.2.1 20240801, File-System: btrfs, Screen Resolution: 1280x800, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x32
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Vulnerable: No microcode + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Not affected + tsx_async_abort: Not affected
This test profile measures how long it takes to complete several reference GNU Octave files via octave-benchmark. GNU Octave is used for numerical computations and is an open-source alternative to MATLAB. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i5-13500 (12 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (4.2023.08-4 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 32GB, Disk: 245GB QEMU HDD, Audio: Intel 82801I, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Fedora 40, Kernel: 6.8.5-301.fc40.x86_64 (x86_64), Desktop: GNOME Shell 46.0, Display Server: X Server, Compiler: GCC 14.2.1 20240801, File-System: btrfs, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x35
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Vulnerable: No microcode + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 20 August 2024 16:12 by user luna.
Processor: Intel Core i5-13500 (6 Cores / 12 Threads), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.1 BIOS), Memory: 16GB, Disk: 268GB Virtual Disk
OS: Fedora Linux 40, Kernel: 6.10.6-200.fc40.x86_64 (x86_64), Desktop: GNOME Shell 46.4, Display Server: X Server, Compiler: GCC 14.2.1 20240801, File-System: btrfs, System Layer: microsoft
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Vulnerable: No microcode + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 August 2024 02:32 by user luna.
Processor: Intel Core i5-13500 (6 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 32GB, Disk: 129GB Virtual disk, Graphics: llvmpipe, Network: Intel 82545EM
OS: Fedora Linux 40, Kernel: 6.8.5-301.fc40.x86_64 (x86_64), Desktop: GNOME Shell 46.0, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 24.0.5 (LLVM 18.1.1 256 bits), Compiler: GCC 14.2.1 20240801, File-System: btrfs, Screen Resolution: 1280x800, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x32
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Vulnerable: No microcode + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 September 2024 19:51 by user luna.