Third execution of this tests
Veamos los resultados obtenidos del desempaquetado de mi kernel
Third execution
Processor: Intel Core i5-1135G7 (1 Core), Motherboard: Oracle VirtualBox v1.2, Memory: 4096MB, Disk: 21GB VBOX HDD, Graphics: vmwgfxdrmfb
OS: Rocky Linux 9.3, Kernel: 5.14.0-362.24.1.el9_3.0.1.x86_64 (x86_64), Compiler: GCC 11.4.1 20230605, File-System: xfs, Screen Resolution: 1280x800, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noquota,relatime,rw,seclabel / Block Size: 4096
Security Notes: SELinux + gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Unpacking The Linux Kernel
This test measures how long it takes to extract the .tar.xz Linux kernel source tree package. Learn more via the OpenBenchmarking.org test page.
Third execution
Processor: Intel Core i5-1135G7 (1 Core), Motherboard: Oracle VirtualBox v1.2, Memory: 4096MB, Disk: 21GB VBOX HDD, Graphics: vmwgfxdrmfb
OS: Rocky Linux 9.3, Kernel: 5.14.0-362.24.1.el9_3.0.1.x86_64 (x86_64), Compiler: GCC 11.4.1 20230605, File-System: xfs, Screen Resolution: 1280x800, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noquota,relatime,rw,seclabel / Block Size: 4096
Security Notes: SELinux + gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 May 2024 11:28 by user .