resultados-system
Oracle VMware testing on Ubuntu 20.04 via the Phoronix Test Suite.
resultados-system
Processor: Intel Core i7-1065G7 (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 1024MB, Disk: 21GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: 2 x Intel 82540EM
OS: Ubuntu 20.04, Kernel: 5.4.0-135-generic (x86_64), Vulkan: 1.1.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 2048x2048, System Layer: Oracle VMware
Kernel Notes: Transparent Huge Pages: madvise
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Systemd Total Boot Time
This test uses systemd-analyze to report the entire boot time. Learn more via the OpenBenchmarking.org test page.
Test: Loader
resultados-system: The test run did not produce a result.
Test: Firmware
resultados-system: The test run did not produce a result.
resultados-system
Processor: Intel Core i7-1065G7 (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 1024MB, Disk: 21GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: 2 x Intel 82540EM
OS: Ubuntu 20.04, Kernel: 5.4.0-135-generic (x86_64), Vulkan: 1.1.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 2048x2048, System Layer: Oracle VMware
Kernel Notes: Transparent Huge Pages: madvise
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 21 December 2022 12:28 by user pablomm.