ubu1109052020

Xen HVM domU 4.2.amazon testing on Ubuntu 18.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2005091-NI-UBU11090577
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
ubu1109052020
May 09 2020
  1 Minute
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


ubu1109052020OpenBenchmarking.orgPhoronix Test SuiteIntel Xeon E5-2686 v4 (4 Cores)Xen HVM domU (4.2.amazon BIOS)Intel 440FX 82441FX PMC16GB8GBCirrus Logic GD 5446Ubuntu 18.044.15.0-1065-aws (x86_64)3.1 Mesa 19.2.8 (LLVM 9.0 256 bits)GCC 7.5.0ext4Xen HVM domU 4.2.amazonProcessorMotherboardChipsetMemoryDiskGraphicsOSKernelOpenGLCompilerFile-SystemSystem LayerUbu1109052020 BenchmarksSystem Logs- --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v - CPU Microcode: 0xb000038- itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected

Sysbench

This is a benchmark of Sysbench with CPU and memory sub-tests. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgEvents Per Second, More Is BetterSysbench 2018-07-28Test: Memoryubu1109052020400K800K1200K1600K2000K1681008.811. (CC) gcc options: -pthread -O3 -funroll-loops -ggdb3 -march=broadwell -rdynamic -ldl -laio -lm

OpenBenchmarking.orgEvents Per Second, More Is BetterSysbench 2018-07-28Test: CPUubu110905202080016002400320040003643.511. (CC) gcc options: -pthread -O3 -funroll-loops -ggdb3 -march=broadwell -rdynamic -ldl -laio -lm