cpu22

KVM testing on Ubuntu 16.04 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/1906123-HV-CPU22810543.

cpu22ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemSystem Layer4 x Intel Xeon X5650 - Cirrus Logic GD 5446 -4 x Intel Xeon X5650 (4 Cores)OpenStack Foundation Nova v17.0.2 (1.10.2-1ubuntu1~cloud0 BIOS)Intel 440FX 82441FX PMC8192MB49GBCirrus Logic GD 5446Red Hat Virtio deviceUbuntu 16.044.4.0-135-generic (x86_64)GCC 5.4.0 20160609ext4KVMOpenBenchmarking.org- --build=x86_64-linux-gnu --disable-browser-plugin --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-tune=generic -v - l1tf: Mitigation of PTE Inversion + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline

cpu22stress-ng: CPU StressStandard ErrorStandard Deviation4 x Intel Xeon X5650 - Cirrus Logic GD 5446 -522.8623.9815.89%OpenBenchmarking.org

Stress-NG

Test: CPU Stress

OpenBenchmarking.orgBogo Ops/s, More Is BetterStress-NG 0.07.26Test: CPU Stress4 x Intel Xeon X5650 - Cirrus Logic GD 5446 -110220330440550SE +/- 23.98, N = 12522.861. (CC) gcc options: -O2 -std=gnu99 -lm -lz -lcrypt -lrt -lpthread -lc


Phoronix Test Suite v10.8.4