xen-rooster-loopback
Xen 4.4.4_02-22.19.1 Hypervisor testing on SUSE 12.3 via the Phoronix Test Suite.
xen-rooster
Processor: Intel Xeon E5-2407 0 @ 2.19GHz (1 Core / 4 Threads), Memory: 10240MB, Disk: 50GB, Graphics: LLVMpipe
OS: SUSE 12.3, Kernel: 4.4.131-94.29-default (x86_64), Desktop: GNOME Shell 3.20.4, Display Server: X Server 1.18.3, Display Driver: modesetting 1.18.3, OpenGL: 3.3 Mesa 17.0.5 Gallium 0.4 (LLVM 3.8 256 bits), Compiler: GCC 4.8.5, File-System: btrfs, Screen Resolution: 1920x1080, System Layer: Xen 4.4.4_02-22.19.1 Hypervisor
Security Notes: __user pointer sanitization + Full generic retpoline Protection
Loopback TCP Network Performance
xen-rooster
Processor: Intel Xeon E5-2407 0 @ 2.19GHz (1 Core / 4 Threads), Memory: 10240MB, Disk: 50GB, Graphics: LLVMpipe
OS: SUSE 12.3, Kernel: 4.4.131-94.29-default (x86_64), Desktop: GNOME Shell 3.20.4, Display Server: X Server 1.18.3, Display Driver: modesetting 1.18.3, OpenGL: 3.3 Mesa 17.0.5 Gallium 0.4 (LLVM 3.8 256 bits), Compiler: GCC 4.8.5, File-System: btrfs, Screen Resolution: 1920x1080, System Layer: Xen 4.4.4_02-22.19.1 Hypervisor
Security Notes: __user pointer sanitization + Full generic retpoline Protection
Testing initiated at 4 June 2018 15:12 by user malte.