microsoft testing on Ubuntu 23.04 via the Phoronix Test Suite.
Processor: Intel Core (3 Cores), Motherboard: Vultr HFC, Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 8GB, Disk: 240GB, Graphics: bochs-drmdrmfb, Audio: QEMU Generic, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 23.04, Kernel: 6.2.0-32-generic (x86_64), Compiler: GCC 12.3.0, File-System: ext4, Screen Resolution: 1280x800, System Layer: microsoft
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: CPU Microcode: 0x1
Python Notes: Python 3.11.4
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
This test profile reports the total time of the different average timed test results from PyBench. PyBench reports average test times for different functions such as BuiltinFunctionCalls and NestedForLoops, with this total result providing a rough estimate as to Python's average performance on a given system. This test profile runs PyBench each time for 20 rounds. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core (3 Cores), Motherboard: Vultr HFC, Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 8GB, Disk: 240GB, Graphics: bochs-drmdrmfb, Audio: QEMU Generic, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 23.04, Kernel: 6.2.0-32-generic (x86_64), Compiler: GCC 12.3.0, File-System: ext4, Screen Resolution: 1280x800, System Layer: microsoft
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: CPU Microcode: 0x1
Python Notes: Python 3.11.4
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 2 February 2024 19:51 by user jackewl.