test32

KVM QEMU 4.2.0 testing on Ubuntu 20.04 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2205020-NE-TEST3254409.

test32ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelVulkanCompilerFile-SystemScreen ResolutionSystem Layertw_test32Red Hat Virtio deviceQEMU Virtual 4.2.0 (1 Core)QEMU Standard PC (i440FX + PIIX 1996) (1.13.0-1ubuntu1.1 BIOS)Intel 440FX 82441FX PMC1 x 512 MB RAM QEMU10GBbochs-drmdrmfbRed Hat Virtio deviceUbuntu 20.045.4.0-109-generic (x86_64)1.1.182GCC 9.4.0ext41024x768KVM QEMU 4.2.0OpenBenchmarking.orgKernel Details- Transparent Huge Pages: neverProcessor Details- CPU Microcode: 0x1Security Details- itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected

test32fast-cli: tw_test32Red Hat Virtio deviceOpenBenchmarking.org


Phoronix Test Suite v10.8.4