resultados_compress-gzip
Docker testing on Ubuntu 20.04.4 LTS via the Phoronix Test Suite.
resultados_compress-gzip
Processor: Intel Core i7-7500U (4 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (1.15.0-1 BIOS), Memory: 3072MB, Disk: 63GB
OS: Ubuntu 20.04.4 LTS, Kernel: 6.6.22-linuxkit (x86_64), File-System: overlayfs, System Layer: Docker
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xf4
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: Not affected + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Gzip Compression
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
resultados_compress-gzip
Processor: Intel Core i7-7500U (4 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (1.15.0-1 BIOS), Memory: 3072MB, Disk: 63GB
OS: Ubuntu 20.04.4 LTS, Kernel: 6.6.22-linuxkit (x86_64), File-System: overlayfs, System Layer: Docker
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xf4
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: Not affected + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 23 April 2024 17:51 by user root.