compressXZMac
compressXZMac
compressXZMac
Processor: 2 x Intel Core i5-7267U (2 Cores), Motherboard: BHYVE 1.00, Memory: 2048MB, Disk: 59GB
OS: Ubuntu 20.04.1 LTS, Kernel: 5.10.25-linuxkit (x86_64), File-System: overlayfs, System Layer: Docker
Kernel Notes: Transparent Huge Pages: madvise
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT Host state unknown + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
System XZ Decompression
This test measures the time to decompress a Linux kernel tarball using XZ. Learn more via the OpenBenchmarking.org test page.
compressXZMac
Processor: 2 x Intel Core i5-7267U (2 Cores), Motherboard: BHYVE 1.00, Memory: 2048MB, Disk: 59GB
OS: Ubuntu 20.04.1 LTS, Kernel: 5.10.25-linuxkit (x86_64), File-System: overlayfs, System Layer: Docker
Kernel Notes: Transparent Huge Pages: madvise
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT Host state unknown + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 26 May 2021 12:23 by user root.