openssl-rhel84
KVM testing on Red Hat Enterprise Linux 8.4 via the Phoronix Test Suite.
openssl-rhel84
Processor: Common KVM (8 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 21GB QEMU HDD, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Red Hat Enterprise Linux 8.4, Kernel: 4.18.0-305.19.1.el8_4.x86_64 (x86_64), Compiler: GCC 8.4.1 20200928, File-System: xfs, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1000065
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
OpenSSL
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test profile makes use of the built-in "openssl speed" benchmarking capabilities. Learn more via the OpenBenchmarking.org test page.
openssl-rhel84
Processor: Common KVM (8 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 21GB QEMU HDD, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Red Hat Enterprise Linux 8.4, Kernel: 4.18.0-305.19.1.el8_4.x86_64 (x86_64), Compiler: GCC 8.4.1 20200928, File-System: xfs, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1000065
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 14 October 2021 20:55 by user yann921.