Microsoft Hyper-V Server testing on Ubuntu 20.04 via the Phoronix Test Suite.
Processor: Intel Xeon E5-2658 v4 (1 Core), Motherboard: Microsoft Virtual Machine v7.0 (090006 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 512 MB Microsoft, Disk: 11GB Virtual Disk, Graphics: Microsoft Hyper-V virtual VGA
OS: Ubuntu 20.04, Kernel: 5.4.0-97-generic (x86_64), Vulkan: 1.1.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1152x864, System Layer: Microsoft Hyper-V Server
Kernel Notes: Transparent Huge Pages: never
Processor Notes: CPU Microcode: 0xffffffff
Java Notes: OpenJDK Runtime Environment (build 11.0.15+10-Ubuntu-0ubuntu0.20.04.1)
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
This very basic test profile runs the stock benchmark of the Java JMH benchmark via Maven. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon E5-2658 v4 (1 Core), Motherboard: Microsoft Virtual Machine v7.0 (090006 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 512 MB Microsoft, Disk: 11GB Virtual Disk, Graphics: Microsoft Hyper-V virtual VGA
OS: Ubuntu 20.04, Kernel: 5.4.0-97-generic (x86_64), Vulkan: 1.1.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1152x864, System Layer: Microsoft Hyper-V Server
Kernel Notes: Transparent Huge Pages: never
Processor Notes: CPU Microcode: 0xffffffff
Java Notes: OpenJDK Runtime Environment (build 11.0.15+10-Ubuntu-0ubuntu0.20.04.1)
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 10 May 2022 15:51 by user root.