network-network-loopback
POWER9 testing on Ubuntu 19.04 via the Phoronix Test Suite.
network-network-loopback-16072019
Processor: POWER9 @ 2.50GHz (80 Cores), Motherboard: CHRP IBM 9009-22A, Memory: 510976MB, Disk: 1862GB IPR-0 767B0100 + 3724GB IPR-10 767B0100, Network: 4 x Broadcom NetXtreme II BCM57810 10 + 4 x Mellanox MT27710
OS: Ubuntu 19.04, Kernel: 5.0.0-13-generic (ppc64le), Compiler: GCC 8.3.0, File-System: ext4
Processor Notes: SMT (threads per core): 8
Security Notes: l1tf: Not affected + meltdown: Mitigation of RFI Flush L1D private per thread + spec_store_bypass: Mitigation of Kernel entry/exit barrier (eieio) + spectre_v1: Mitigation of __user pointer sanitization ori31 speculation barrier enabled + spectre_v2: Mitigation of Indirect branch cache disabled
Loopback TCP Network Performance
This test measures the loopback network adapter performance using a micro-benchmark to measure the TCP performance. Learn more via the OpenBenchmarking.org test page.
network-network-loopback-16072019
Processor: POWER9 @ 2.50GHz (80 Cores), Motherboard: CHRP IBM 9009-22A, Memory: 510976MB, Disk: 1862GB IPR-0 767B0100 + 3724GB IPR-10 767B0100, Network: 4 x Broadcom NetXtreme II BCM57810 10 + 4 x Mellanox MT27710
OS: Ubuntu 19.04, Kernel: 5.0.0-13-generic (ppc64le), Compiler: GCC 8.3.0, File-System: ext4
Processor Notes: SMT (threads per core): 8
Security Notes: l1tf: Not affected + meltdown: Mitigation of RFI Flush L1D private per thread + spec_store_bypass: Mitigation of Kernel entry/exit barrier (eieio) + spectre_v1: Mitigation of __user pointer sanitization ori31 speculation barrier enabled + spectre_v2: Mitigation of Indirect branch cache disabled
Testing initiated at 16 July 2019 13:46 by user petrherman.