centosmemoria
KVM VMware testing on CentOS Linux 7 via the Phoronix Test Suite.
centosmemoria
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
centosdisco
Processor: Intel Core i7-6500U (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 486MB, Disk: 9GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: 3 x Intel 82540EM
OS: CentOS Linux 7, Kernel: 3.10.0-1127.19.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 2048x2048, System Layer: KVM VMware
Disk Notes: DEADLINE / attr2,inode64,noquota,relatime,rw,seclabel
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
libjpeg-turbo tjbench
tjbench is a JPEG decompression/compression benchmark part of libjpeg-turbo. Learn more via the OpenBenchmarking.org test page.
Unpacking The Linux Kernel
This test measures how long it takes to extract the .tar.xz Linux kernel package. Learn more via the OpenBenchmarking.org test page.
centosmemoria
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 27 November 2020 01:20 by user root.
centosdisco
Processor: Intel Core i7-6500U (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 486MB, Disk: 9GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: 3 x Intel 82540EM
OS: CentOS Linux 7, Kernel: 3.10.0-1127.19.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 2048x2048, System Layer: KVM VMware
Disk Notes: DEADLINE / attr2,inode64,noquota,relatime,rw,seclabel
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 27 November 2020 01:26 by user root.