QEMU Standard PC (i440FX + PIIX 1996) (rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org BIOS) On Ubuntu 20.04.4 LTS
Various open-source benchmarks by the Phoronix Test Suite v10.8.3.
Common KVM
Processor: Common KVM (4 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org BIOS), Memory: 16GB, Disk: 107GB QEMU HDD, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor
OS: Ubuntu 20.04.4 LTS, Kernel: 5.15.0-52-generic (x86_64), File-System: overlayfs, Screen Resolution: 1024x768, System Layer: Docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
NeatBench
NeatBench is a benchmark of the cross-platform Neat Video software on the CPU and optional GPU (OpenCL / CUDA) support. Learn more via the OpenBenchmarking.org test page.
Y-Cruncher
Y-Cruncher is a multi-threaded Pi benchmark capable of computing Pi to trillions of digits. Learn more via the OpenBenchmarking.org test page.
Common KVM
Processor: Common KVM (4 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org BIOS), Memory: 16GB, Disk: 107GB QEMU HDD, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor
OS: Ubuntu 20.04.4 LTS, Kernel: 5.15.0-52-generic (x86_64), File-System: overlayfs, Screen Resolution: 1024x768, System Layer: Docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 11 November 2022 04:58 by user root.