first_test_10_09_2020
Intel Core 2 Quad Q6600 testing with a TYAN S5191 (6.00 BIOS) and XGI on Ubuntu 16.04 via the Phoronix Test Suite.
Intel Core 2 Quad Q6600 - XGI - TYAN S5191 (6.00 BIOS)
Processor: Intel Core 2 Quad Q6600 @ 0.90GHz (4 Cores), Motherboard: TYAN S5191 (6.00 BIOS), Chipset: Intel E7230/3000/3010 + ICH7, Memory: 4 x 512 MB DDR-133MHz, Disk: 500GB Western Digital WD5003AZEX-0, Graphics: XGI, Network: 2 x Intel 82573V + Intel 82557/8/9/0/1
OS: Ubuntu 16.04, Kernel: 4.4.0-186-generic (x86_64), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 640x480
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0xba
Python Notes: Python 3.5.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: kernel-off STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Intel Xeon E3-1240 V2 - Matrox MGA G200eW WPCM450 -
Processor: Intel Xeon E3-1240 V2 @ 3.80GHz (4 Cores / 8 Threads), Motherboard: Supermicro X9SCL/X9SCM (2.10 BIOS), Chipset: Intel Xeon E3-1200 v2/Ivy, Memory: 4 x 2048 MB DDR3-1333MHz Kingston, Disk: 500GB Western Digital WD5003AZEX-0, Graphics: Matrox MGA G200eW WPCM450, Network: Intel 82579LM + Intel 82574L
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x21
Python Notes: Python 3.5.2
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Intel Xeon E5-2620 0 - Matrox G200eR2 - Supermicro
Processor: Intel Xeon E5-2620 0 @ 2.50GHz (6 Cores / 12 Threads), Motherboard: Supermicro X9DRW v0123456789 (3.0a BIOS), Chipset: Intel Xeon E5/Core, Memory: 2 x 8192 MB DDR3-1333MHz Kingston, Disk: 500GB Western Digital WD5003AZEX-0, Graphics: Matrox G200eR2, Network: 2 x Intel I350
OS: Ubuntu 16.04, Kernel: 4.4.0-186-generic (x86_64), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 800x600
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x71a
Python Notes: Python 3.5.2
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Intel Xeon E5405 - AMD ES1000 128MB - IBM Planar
Processor: Intel Xeon E5405 @ 2.00GHz (4 Cores), Motherboard: IBM Planar (-[GFE136BUS-1.09] BIOS), Chipset: Intel 5000X MCH, Memory: 16GB, Disk: 256GB ssd, Graphics: AMD ES1000 128MB, Monitor: IBM RSA2, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Ubuntu 16.04, Kernel: 4.4.0-142-generic (i686), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: CPU Microcode: 0x60f
Python Notes: Python 3.5.2
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline
Intel Xeon Gold 6132 - Microsoft Hyper-V virtual VGA
Processor: Intel Xeon Gold 6132 (4 Cores), Motherboard: Microsoft Virtual Machine v7.0 (090006 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 3968 MB + 8320 MB, Disk: 21GB Virtual Disk, Graphics: Microsoft Hyper-V virtual VGA
OS: Ubuntu 20.04, Kernel: 5.4.0-42-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1152x864, System Layer: Microsoft Hyper-V Server
Processor Notes: CPU Microcode: 0xffffffff
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
6 x Intel Xeon E5-2670 0 - Cirrus Logic GD 5446 -
Processor: 6 x Intel Xeon E5-2670 0 @ 2.60GHz (6 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996), Chipset: Intel 440FX- 82441FX PMC, Memory: 1 x 7168 MB RAM QEMU, Disk: 20GB, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 4.15.0-117-generic (x86_64), File-System: ext4, Screen Resolution: 1024x768, System Layer: qemu
System Notes: Python 2.7.17.
Intel Xeon E5-2660 0 - Microsoft Hyper-V virtual VGA
Processor: Intel Xeon E5-2660 0 (4 Cores), Motherboard: Microsoft Virtual Machine v7.0 (090004 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 3968 MB + 128 MB, Disk: 86GB Virtual Disk, Graphics: Microsoft Hyper-V virtual VGA
OS: Ubuntu 18.04, Kernel: 4.15.0-117-generic (x86_64), Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1152x864, System Layer: Microsoft Hyper-V Server
Processor Notes: CPU Microcode: 0xffffffff
Python Notes: Python 3.6.9
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
PyBench
This test profile reports the total time of the different average timed test results from PyBench. PyBench reports average test times for different functions such as BuiltinFunctionCalls and NestedForLoops, with this total result providing a rough estimate as to Python's average performance on a given system. This test profile runs PyBench each time for 20 rounds. Learn more via the OpenBenchmarking.org test page.
Intel Core 2 Quad Q6600 - XGI - TYAN S5191 (6.00 BIOS)
Processor: Intel Core 2 Quad Q6600 @ 0.90GHz (4 Cores), Motherboard: TYAN S5191 (6.00 BIOS), Chipset: Intel E7230/3000/3010 + ICH7, Memory: 4 x 512 MB DDR-133MHz, Disk: 500GB Western Digital WD5003AZEX-0, Graphics: XGI, Network: 2 x Intel 82573V + Intel 82557/8/9/0/1
OS: Ubuntu 16.04, Kernel: 4.4.0-186-generic (x86_64), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 640x480
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0xba
Python Notes: Python 3.5.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: kernel-off STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 10 September 2020 18:56 by user root.
Intel Xeon E3-1240 V2 - Matrox MGA G200eW WPCM450 -
Processor: Intel Xeon E3-1240 V2 @ 3.80GHz (4 Cores / 8 Threads), Motherboard: Supermicro X9SCL/X9SCM (2.10 BIOS), Chipset: Intel Xeon E3-1200 v2/Ivy, Memory: 4 x 2048 MB DDR3-1333MHz Kingston, Disk: 500GB Western Digital WD5003AZEX-0, Graphics: Matrox MGA G200eW WPCM450, Network: Intel 82579LM + Intel 82574L
OS: Ubuntu 16.04, Kernel: 4.4.0-186-generic (x86_64), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 640x480
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x21
Python Notes: Python 3.5.2
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 14 September 2020 11:04 by user root.
Intel Xeon E5-2620 0 - Matrox G200eR2 - Supermicro
Processor: Intel Xeon E5-2620 0 @ 2.50GHz (6 Cores / 12 Threads), Motherboard: Supermicro X9DRW v0123456789 (3.0a BIOS), Chipset: Intel Xeon E5/Core, Memory: 2 x 8192 MB DDR3-1333MHz Kingston, Disk: 500GB Western Digital WD5003AZEX-0, Graphics: Matrox G200eR2, Network: 2 x Intel I350
OS: Ubuntu 16.04, Kernel: 4.4.0-186-generic (x86_64), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 800x600
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x71a
Python Notes: Python 3.5.2
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 14 September 2020 11:15 by user root.
Intel Xeon E5405 - AMD ES1000 128MB - IBM Planar
Processor: Intel Xeon E5405 @ 2.00GHz (4 Cores), Motherboard: IBM Planar (-[GFE136BUS-1.09] BIOS), Chipset: Intel 5000X MCH, Memory: 16GB, Disk: 256GB ssd, Graphics: AMD ES1000 128MB, Monitor: IBM RSA2, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Ubuntu 16.04, Kernel: 4.4.0-142-generic (i686), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: CPU Microcode: 0x60f
Python Notes: Python 3.5.2
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline
Testing initiated at 14 September 2020 12:32 by user root.
Intel Xeon Gold 6132 - Microsoft Hyper-V virtual VGA
Processor: Intel Xeon Gold 6132 (4 Cores), Motherboard: Microsoft Virtual Machine v7.0 (090006 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 3968 MB + 8320 MB, Disk: 21GB Virtual Disk, Graphics: Microsoft Hyper-V virtual VGA
OS: Ubuntu 20.04, Kernel: 5.4.0-42-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1152x864, System Layer: Microsoft Hyper-V Server
Processor Notes: CPU Microcode: 0xffffffff
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 18 September 2020 10:57 by user root.
6 x Intel Xeon E5-2670 0 - Cirrus Logic GD 5446 -
Processor: 6 x Intel Xeon E5-2670 0 @ 2.60GHz (6 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996), Chipset: Intel 440FX- 82441FX PMC, Memory: 1 x 7168 MB RAM QEMU, Disk: 20GB, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 4.15.0-117-generic (x86_64), File-System: ext4, Screen Resolution: 1024x768, System Layer: qemu
System Notes: Python 2.7.17.
Testing initiated at 18 September 2020 11:46 by user root.
Intel Xeon E5-2660 0 - Microsoft Hyper-V virtual VGA
Processor: Intel Xeon E5-2660 0 (4 Cores), Motherboard: Microsoft Virtual Machine v7.0 (090004 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 3968 MB + 128 MB, Disk: 86GB Virtual Disk, Graphics: Microsoft Hyper-V virtual VGA
OS: Ubuntu 18.04, Kernel: 4.15.0-117-generic (x86_64), Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1152x864, System Layer: Microsoft Hyper-V Server
Processor Notes: CPU Microcode: 0xffffffff
Python Notes: Python 3.6.9
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 18 September 2020 12:15 by user root.