benchmark
in a vm, with 8G ram 2 sockets each 20 cores, default CPU type (no passthrough)
amnesia
Processor: 2 x Intel Xeon Silver 4114 @ 3.00GHz (20 Cores / 40 Threads), Motherboard: Dell 0PRWNC (2.2.11 BIOS), Memory: 8192MB, Disk: 2 x 400GB KPM5XMUG400G + 8 x 8002GB TOSHIBA MG06ACA8, Graphics: mgadrmfb
OS: Debian 10, Kernel: 5.0.21-2-pve (x86_64), Compiler: GCC 8.3.0, File-System: zfs, Screen Resolution: 1024x768, System Layer: lxc
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
qemu
Processor: 2 x Common KVM (40 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 8000 MB RAM QEMU, Disk: 34GB QEMU HDD, Graphics: bochsdrmfb, Network: Red Hat Virtio device
OS: Debian 10, Kernel: 4.19.0-6-amd64 (x86_64), File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Blender
Blender is an open-source 3D creation software project. This test is of Blender's Cycles benchmark with various sample files. GPU computing via OpenCL or CUDA is supported. Learn more via the OpenBenchmarking.org test page.
amnesia
Processor: 2 x Intel Xeon Silver 4114 @ 3.00GHz (20 Cores / 40 Threads), Motherboard: Dell 0PRWNC (2.2.11 BIOS), Memory: 8192MB, Disk: 2 x 400GB KPM5XMUG400G + 8 x 8002GB TOSHIBA MG06ACA8, Graphics: mgadrmfb
OS: Debian 10, Kernel: 5.0.21-2-pve (x86_64), Compiler: GCC 8.3.0, File-System: zfs, Screen Resolution: 1024x768, System Layer: lxc
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 28 November 2019 18:02 by user root.
qemu
Processor: 2 x Common KVM (40 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 8000 MB RAM QEMU, Disk: 34GB QEMU HDD, Graphics: bochsdrmfb, Network: Red Hat Virtio device
OS: Debian 10, Kernel: 4.19.0-6-amd64 (x86_64), File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 4 February 2020 18:43 by user root.