KVM VirtualBox testing on CentOS Linux 7 via the Phoronix Test Suite.
Processor: Intel Core i5-6200U (1 Core), Motherboard: Oracle VirtualBox v1.2, Memory: 1024MB, Disk: 9GB VBOX HDD, Graphics: svgadrmfb
OS: CentOS Linux 7, Kernel: 3.10.0-1127.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 2048x2048, System Layer: KVM VirtualBox
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
This is a test of t-test1 for basic memory allocator benchmarks. Note this test profile is currently very basic and the overall time does include the warmup time of the custom t-test1 compilation. Improvements welcome. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i5-6200U (1 Core), Motherboard: Oracle VirtualBox v1.2, Memory: 1024MB, Disk: 9GB VBOX HDD, Graphics: svgadrmfb
OS: CentOS Linux 7, Kernel: 3.10.0-1127.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 2048x2048, System Layer: KVM VirtualBox
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
Testing initiated at 3 December 2020 23:10 by user root.