prueba2
prueba22
QEMU HDD - 2 x Westmere E56xx
Disk Notes: BFQ / relatime,rw,seclabel
Processor Notes: CPU Microcode: 0x1
Java Notes: OpenJDK Runtime Environment (build 1.8.0_252-b09)
Security Notes: SELinux + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
prueba22
Processor: 2 x Westmere E56xx/L56xx/X56xx (Nehalem-C) (6 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 16 GB + 4 GB RAM, Disk: 64GB QEMU HDD, Graphics: llvmpipe 20GB, Monitor: QEMU Monitor, Network: Intel 82540EM
OS: Fedora 32, Kernel: 5.6.10-300.fc32.x86_64 (x86_64), Desktop: GNOME Shell 3.36.2, Display Server: X Server, OpenGL: 3.3 Mesa 20.0.6 (LLVM 10.0.0 128 bits), File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Processor Notes: CPU Microcode: 0x1
Security Notes: SELinux + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
ebizzy
This is a test of ebizzy, a program to generate workloads resembling web server workloads. Learn more via the OpenBenchmarking.org test page.
Facebook RocksDB
This is a benchmark of Facebook's RocksDB as an embeddable persistent key-value store for fast storage based on Google's LevelDB. Learn more via the OpenBenchmarking.org test page.
NGINX Benchmark
This is a test of ab, which is the Apache Benchmark program running against nginx. This test profile measures how many requests per second a given system can sustain when carrying out 2,000,000 requests with 500 requests being carried out concurrently. Learn more via the OpenBenchmarking.org test page.
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
QEMU HDD - 2 x Westmere E56xx
Disk Notes: BFQ / relatime,rw,seclabel
Processor Notes: CPU Microcode: 0x1
Java Notes: OpenJDK Runtime Environment (build 1.8.0_252-b09)
Security Notes: SELinux + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 9 May 2020 18:23 by user root.
prueba22
Processor: 2 x Westmere E56xx/L56xx/X56xx (Nehalem-C) (6 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 16 GB + 4 GB RAM, Disk: 64GB QEMU HDD, Graphics: llvmpipe 20GB, Monitor: QEMU Monitor, Network: Intel 82540EM
OS: Fedora 32, Kernel: 5.6.10-300.fc32.x86_64 (x86_64), Desktop: GNOME Shell 3.36.2, Display Server: X Server, OpenGL: 3.3 Mesa 20.0.6 (LLVM 10.0.0 128 bits), File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Processor Notes: CPU Microcode: 0x1
Security Notes: SELinux + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 10 May 2020 18:22 by user root.