first_vds_common_18-09-2020
Microsoft Hyper-V Server testing on Ubuntu 20.04 via the Phoronix Test Suite.
Intel Xeon Gold 6132 - Microsoft Hyper-V virtual VGA
Processor: Intel Xeon Gold 6132 (4 Cores), Motherboard: Microsoft Virtual Machine v7.0 (090006 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 3968 MB + 8320 MB, Disk: 21GB Virtual Disk, Graphics: Microsoft Hyper-V virtual VGA
OS: Ubuntu 20.04, Kernel: 5.4.0-42-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1152x864, System Layer: Microsoft Hyper-V Server
Processor Notes: CPU Microcode: 0xffffffff
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
PyBench
This test profile reports the total time of the different average timed test results from PyBench. PyBench reports average test times for different functions such as BuiltinFunctionCalls and NestedForLoops, with this total result providing a rough estimate as to Python's average performance on a given system. This test profile runs PyBench each time for 20 rounds. Learn more via the OpenBenchmarking.org test page.
Intel Xeon Gold 6132 - Microsoft Hyper-V virtual VGA
Processor: Intel Xeon Gold 6132 (4 Cores), Motherboard: Microsoft Virtual Machine v7.0 (090006 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 3968 MB + 8320 MB, Disk: 21GB Virtual Disk, Graphics: Microsoft Hyper-V virtual VGA
OS: Ubuntu 20.04, Kernel: 5.4.0-42-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1152x864, System Layer: Microsoft Hyper-V Server
Processor Notes: CPU Microcode: 0xffffffff
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 18 September 2020 10:57 by user root.