a
KVM testing on UOS Server Enterprise-C 20 via the Phoronix Test Suite.
a
Processor: Intel Core @ 2.11GHz (1 Core), Motherboard: Red Hat KVM, Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 1 x 1536 MB RAM, Disk: 17GB, Graphics: Red Hat QXL paravirtual graphic card, Audio: QEMU Generic, Network: Red Hat Virtio device
OS: UOS Server Enterprise-C 20, Kernel: 4.19.0-91.77.18.uelc20.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Driver: modesetting 1.20.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1024x768, System Layer: KVM
Intel Core
Processor: Intel Core (1 Core), Motherboard: Red Hat KVM (1.11.1-4.module_el8.2.0+320+13f867d7 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 1 x 1536 MB RAM, Disk: 17GB, Graphics: llvmpipe, Audio: QEMU Generic, Network: Red Hat Virtio device
OS: UOS Server Enterprise-C 20, Kernel: 4.19.0-91.77.18.uelc20.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Mitigation of TSX disabled + tsx_async_abort: Not affected
7-Zip Compression
This is a test of 7-Zip using p7zip with its integrated benchmark feature or upstream 7-Zip for the Windows x64 build. Learn more via the OpenBenchmarking.org test page.
a
Processor: Intel Core @ 2.11GHz (1 Core), Motherboard: Red Hat KVM, Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 1 x 1536 MB RAM, Disk: 17GB, Graphics: Red Hat QXL paravirtual graphic card, Audio: QEMU Generic, Network: Red Hat Virtio device
OS: UOS Server Enterprise-C 20, Kernel: 4.19.0-91.77.18.uelc20.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Driver: modesetting 1.20.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1024x768, System Layer: KVM
Testing initiated at 30 March 2021 11:12 by user .
Intel Core
Processor: Intel Core (1 Core), Motherboard: Red Hat KVM (1.11.1-4.module_el8.2.0+320+13f867d7 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 1 x 1536 MB RAM, Disk: 17GB, Graphics: llvmpipe, Audio: QEMU Generic, Network: Red Hat Virtio device
OS: UOS Server Enterprise-C 20, Kernel: 4.19.0-91.77.18.uelc20.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Mitigation of TSX disabled + tsx_async_abort: Not affected
Testing initiated at 31 March 2021 05:50 by user .