Docker testing on Ubuntu 20.10 via the Phoronix Test Suite.
Processor: Intel Core i5-8305G (2 Cores / 4 Threads), Memory: 3072MB, Disk: 2 x 275GB Virtual Disk
OS: Ubuntu 20.10, Kernel: 4.19.84-microsoft-standard+ (x86_64), Compiler: GCC 10.3.0, File-System: fuseblk, Screen Resolution: 1024x768, System Layer: Docker
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / allow_other,default_permissions,group_id=0,relatime,rw,user_id=0 / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x5003102
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
OS: Ubuntu 20.10, Kernel: 4.19.84-microsoft-standard+ (x86_64), Compiler: GCC 10.3.0, File-System: overlayfs, Screen Resolution: 1024x768, System Layer: Docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x5003102
Disk Scheduler Notes: MQ-DEADLINE
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
This test measures how long it takes to extract the .tar.xz Linux kernel package. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i5-8305G (2 Cores / 4 Threads), Memory: 3072MB, Disk: 2 x 275GB Virtual Disk
OS: Ubuntu 20.10, Kernel: 4.19.84-microsoft-standard+ (x86_64), Compiler: GCC 10.3.0, File-System: fuseblk, Screen Resolution: 1024x768, System Layer: Docker
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / allow_other,default_permissions,group_id=0,relatime,rw,user_id=0 / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x5003102
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 13 October 2021 09:46 by user root.
Processor: Intel Core i5-8305G (2 Cores / 4 Threads), Memory: 3072MB, Disk: 2 x 275GB Virtual Disk
OS: Ubuntu 20.10, Kernel: 4.19.84-microsoft-standard+ (x86_64), Compiler: GCC 10.3.0, File-System: overlayfs, Screen Resolution: 1024x768, System Layer: Docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x5003102
Disk Scheduler Notes: MQ-DEADLINE
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 13 October 2021 09:53 by user root.