Oracle VMware testing on Zorin 16 via the Phoronix Test Suite.
Processor: Intel Core i3-1005G1 (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 2048MB, Disk: 27GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Zorin 16, Kernel: 5.15.0-84-generic (x86_64), Desktop: GNOME Shell 3.38.4, Display Server: X Server 1.20.13, File-System: ext4, Screen Resolution: 1366x665, System Layer: Oracle VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS RSB filling PBRSB-eIBRS: SW sequence + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i3-1005G1 (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 2048MB, Disk: 27GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Zorin 16, Kernel: 5.15.0-84-generic (x86_64), Desktop: GNOME Shell 3.38.4, Display Server: X Server 1.20.13, File-System: ext4, Screen Resolution: 1366x665, System Layer: Oracle VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS RSB filling PBRSB-eIBRS: SW sequence + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 15 August 2024 17:18 by user dham.