hmmer-test-result-vbox-bvm
KVM VMware testing on CentOS Linux 7 via the Phoronix Test Suite.
Intel Xeon E5-2650 v2
Processor: Intel Xeon E5-2650 v2 (8 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: + ICH7-M, Memory: 16GB, Disk: 21GB VBOX HDD, Graphics: VMware SVGA II, Network: Intel 82540EM
OS: CentOS Linux 7, Kernel: 3.10.0-1160.105.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 2048x2048, System Layer: KVM VMware
Kernel Notes: Transparent Huge Pages: always
Security Notes: gather_data_sampling: Not affected + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Not affected + tsx_async_abort: Not affected
0002
Changed Processor to Intel Xeon E5-2650 v2 (2 Cores).
Timed HMMer Search
This test searches through the Pfam database of profile hidden markov models. The search finds the domain structure of Drosophila Sevenless protein. Learn more via the OpenBenchmarking.org test page.
Intel Xeon E5-2650 v2
Processor: Intel Xeon E5-2650 v2 (8 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: + ICH7-M, Memory: 16GB, Disk: 21GB VBOX HDD, Graphics: VMware SVGA II, Network: Intel 82540EM
OS: CentOS Linux 7, Kernel: 3.10.0-1160.105.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 2048x2048, System Layer: KVM VMware
Kernel Notes: Transparent Huge Pages: always
Security Notes: gather_data_sampling: Not affected + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 7 January 2024 18:44 by user .
0002
Processor: Intel Xeon E5-2650 v2 (2 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: + ICH7-M, Memory: 16GB, Disk: 21GB VBOX HDD, Graphics: VMware SVGA II, Network: Intel 82540EM
OS: CentOS Linux 7, Kernel: 3.10.0-1160.105.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 2048x2048, System Layer: KVM VMware
Kernel Notes: Transparent Huge Pages: always
Security Notes: gather_data_sampling: Not affected + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 7 January 2024 20:06 by user .