IperfFinal_12-8
KVM QEMU testing on Fedora Linux 35 via the Phoronix Test Suite.
Red Hat Virtio device
Processor: QEMU Virtual 2.5+ (3 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 2048MB, Disk: 16GB QEMU HDD, Graphics: bochs-drm, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Fedora Linux 35, Kernel: 5.14.10-300.fc35.x86_64 (x86_64), File-System: xfs, Screen Resolution: 1280x800, System Layer: KVM QEMU
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
iPerf
iPerf is a network bandwidth throughput testing software. This test profile is used for automated testing of an iperf client and requires you have access to an iperf server. Learn more via the OpenBenchmarking.org test page.
Red Hat Virtio device
Processor: QEMU Virtual 2.5+ (3 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 2048MB, Disk: 16GB QEMU HDD, Graphics: bochs-drm, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Fedora Linux 35, Kernel: 5.14.10-300.fc35.x86_64 (x86_64), File-System: xfs, Screen Resolution: 1280x800, System Layer: KVM QEMU
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 May 2024 12:05 by user rec2324.