testProcesador7
KVM VMware testing on CentOS Linux 7 via the Phoronix Test Suite.
testProcesador7
Processor: Intel Core i5-8300H (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 486MB, Disk: 9GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: CentOS Linux 7, Kernel: 3.10.0-1127.19.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 2048x2048, System Layer: KVM VMware
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
SciMark
This test runs the ANSI C version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This test is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
testProcesador7
Processor: Intel Core i5-8300H (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 486MB, Disk: 9GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: CentOS Linux 7, Kernel: 3.10.0-1127.19.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 2048x2048, System Layer: KVM VMware
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 2 December 2020 17:42 by user root.