2019-09-18-1740
openvz testing on CentOS Linux 7 via the Phoronix Test Suite.
2019-09-18 17:40
Processor: Intel Xeon E5-2680 v3 (12 Cores), Memory: 8192MB, Disk: 505GB
OS: CentOS Linux 7, Kernel: 3.10.0-042stab140.1 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, System Layer: openvz
2019-09-18 09:05
Processor: Intel Xeon E5-2673 v4 (4 Cores), Motherboard: Microsoft Virtual Machine v7.0 (090007 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1024 MB + 7168 MB, Disk: 34GB Virtual Disk + 43GB Virtual Disk + 69GB Virtual Disk, Graphics: Microsoft Hyper-V virtual VGA
OS: Red Hat Enterprise Linux Server 7.7, Kernel: 3.10.0-1062.1.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1152x864, System Layer: Microsoft Hyper-V Server
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Security Notes: SELinux + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB
2019-09-24 09:28
Processor: Intel Xeon Platinum 8124M (2 Cores / 4 Threads), Motherboard: Amazon EC2 c5.xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8192MB, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Red Hat Enterprise Linux 8.0, Kernel: 4.18.0-80.4.2.el8_0.x86_64 (x86_64), Compiler: GCC 8.2.1 20180905, File-System: xfs, System Layer: KVM
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Security Notes: SELinux + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
1 x 8192 MB DRAM
Processor: 4 x Intel Xeon Gold 6126 (7 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 8192 MB DRAM, Disk: 107GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Red Hat Enterprise Linux Server 7.6, Kernel: 3.10.0-957.1.3.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1672x1254, System Layer: VMware
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Security Notes: SELinux + l1tf: Mitigation of PTE Inversion + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of Full retpoline
Tinymembench
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
t-test1
This is a test of t-test1 for basic memory allocator benchmarks. Note this test profile is currently very basic and the overall time does include the warmup time of the custom t-test1 compilation. Improvements welcome. Learn more via the OpenBenchmarking.org test page.
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
MBW
This is a basic/simple memory (RAM) bandwidth benchmark for memory copy operations. Learn more via the OpenBenchmarking.org test page.
t-test1
This is a test of t-test1 for basic memory allocator benchmarks. Note this test profile is currently very basic and the overall time does include the warmup time of the custom t-test1 compilation. Improvements welcome. Learn more via the OpenBenchmarking.org test page.
MBW
This is a basic/simple memory (RAM) bandwidth benchmark for memory copy operations. Learn more via the OpenBenchmarking.org test page.
RAMspeed SMP
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
MBW
This is a basic/simple memory (RAM) bandwidth benchmark for memory copy operations. Learn more via the OpenBenchmarking.org test page.
2019-09-18 17:40
Processor: Intel Xeon E5-2680 v3 (12 Cores), Memory: 8192MB, Disk: 505GB
OS: CentOS Linux 7, Kernel: 3.10.0-042stab140.1 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, System Layer: openvz
Testing initiated at 18 September 2019 17:40 by user .
2019-09-18 09:05
Processor: Intel Xeon E5-2673 v4 (4 Cores), Motherboard: Microsoft Virtual Machine v7.0 (090007 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1024 MB + 7168 MB, Disk: 34GB Virtual Disk + 43GB Virtual Disk + 69GB Virtual Disk, Graphics: Microsoft Hyper-V virtual VGA
OS: Red Hat Enterprise Linux Server 7.7, Kernel: 3.10.0-1062.1.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1152x864, System Layer: Microsoft Hyper-V Server
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Security Notes: SELinux + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB
Testing initiated at 18 September 2019 09:05 by user root.
2019-09-24 09:28
Processor: Intel Xeon Platinum 8124M (2 Cores / 4 Threads), Motherboard: Amazon EC2 c5.xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8192MB, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Red Hat Enterprise Linux 8.0, Kernel: 4.18.0-80.4.2.el8_0.x86_64 (x86_64), Compiler: GCC 8.2.1 20180905, File-System: xfs, System Layer: KVM
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Security Notes: SELinux + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 24 September 2019 09:28 by user root.
1 x 8192 MB DRAM
Processor: 4 x Intel Xeon Gold 6126 (7 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 8192 MB DRAM, Disk: 107GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Red Hat Enterprise Linux Server 7.6, Kernel: 3.10.0-957.1.3.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1672x1254, System Layer: VMware
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Security Notes: SELinux + l1tf: Mitigation of PTE Inversion + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of Full retpoline
Testing initiated at 17 September 2019 11:14 by user root.