phoronix-test-results
KVM testing on Clear Linux OS 29390 via the Phoronix Test Suite.
test1
Processor: Intel Xeon Platinum 8175M (1 Core / 2 Threads), Motherboard: Amazon EC2 t3.small (1.0 BIOS), Memory: 2048MB, Disk: 21GB Amazon Elastic Block Store
OS: Clear Linux OS 29390, Kernel: 4.15.0-1065-aws (x86_64), Compiler: GCC 9.1.1 20190512 gcc-9-branch@271104 + Clang 8.0.0 + LLVM 8.0.0, File-System: overlayfs, System Layer: KVM
Processor Notes: CPU Microcode: 0x2000069
Python Notes: Python 3.7.3
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
PyBench
This test profile reports the total time of the different average timed test results from PyBench. PyBench reports average test times for different functions such as BuiltinFunctionCalls and NestedForLoops, with this total result providing a rough estimate as to Python's average performance on a given system. This test profile runs PyBench each time for 20 rounds. Learn more via the OpenBenchmarking.org test page.
test1
Processor: Intel Xeon Platinum 8175M (1 Core / 2 Threads), Motherboard: Amazon EC2 t3.small (1.0 BIOS), Memory: 2048MB, Disk: 21GB Amazon Elastic Block Store
OS: Clear Linux OS 29390, Kernel: 4.15.0-1065-aws (x86_64), Compiler: GCC 9.1.1 20190512 gcc-9-branch@271104 + Clang 8.0.0 + LLVM 8.0.0, File-System: overlayfs, System Layer: KVM
Processor Notes: CPU Microcode: 0x2000069
Python Notes: Python 3.7.3
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 18 May 2020 07:32 by user root.