kkkk

qemu testing on Ubuntu 23.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2307067-NE-KKKK2519468
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
hzju
July 06 2023
  1 Minute


kkkkOpenBenchmarking.orgPhoronix Test SuiteIntel Xeon W-1250 (12 Cores)QEMU Standard PC (i440FX + PIIX 1996) (e0d6339-dirty-20220919_024111-d528eb931742 BIOS)Intel 440FX 82441FX PMC48GB687GB QEMU HDDllvmpipeQEMU GenericQEMU MonitorIntel 82540EMUbuntu 23.046.4.2-1-liquorix-amd64 (x86_64)KDE Plasma 5.27.4X Server 1.21.1.74.5 Mesa 23.0.2 (LLVM 15.0.7 256 bits)GCC 12.2.0 + Clang 15.0.7 + LLVM 15.0.7 + CUDA 11.8ext41920x1080qemuProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerOpenGLCompilerFile-SystemScreen ResolutionSystem LayerKkkk BenchmarksSystem Logs- Transparent Huge Pages: madvise- BFQ / errors=remount-ro,relatime,rw / Block Size: 4096- CPU Microcode: 0xcc- itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: eIBRS with unprivileged eBPF + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected

Unpacking The Linux Kernel

This test measures how long it takes to extract the .tar.xz Linux kernel source tree package. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSeconds, Fewer Is BetterUnpacking The Linux Kernel 5.19linux-5.19.tar.xzhzju246810SE +/- 0.091, N = 47.552