KVM testing on CentOS Linux 7 via the Phoronix Test Suite.
Processor: Intel Xeon Platinum 8175M (2 Cores / 4 Threads), Motherboard: Amazon EC2 m5.xlarge (1.0 BIOS), Memory: 16GB, Disk: 9GB Amazon Elastic Block Store + 107GB Amazon Elastic Block Store
OS: Debian GNU/Linux 10, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 8.3.0, File-System: overlayfs, System Layer: container-other
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x2000069
Disk Scheduler Notes: NONE
Java Notes: OpenJDK Runtime Environment (build 11.0.7+10-post-Debian-3deb10u1)
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
OS: CentOS Linux 7, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: overlayfs, System Layer: KVM
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x2000069
Disk Scheduler Notes: NONE
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
This is a test of ab, which is the Apache benchmark program, using the system's supplied Apache web server. Learn more via the OpenBenchmarking.org test page.
Fio is an advanced disk benchmark that depends upon the kernel's AIO access library. Learn more via the OpenBenchmarking.org test page.
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
This is a test of ab, which is the Apache Benchmark program running against nginx. This test profile measures how many requests per second a given system can sustain when carrying out 2,000,000 requests with 500 requests being carried out concurrently. Learn more via the OpenBenchmarking.org test page.
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test measures the RSA 4096-bit performance of OpenSSL. Learn more via the OpenBenchmarking.org test page.
Pmbench is a Linux paging and virtual memory benchmark. This test profile will report the average page latency of the system. Learn more via the OpenBenchmarking.org test page.
Learn more via the OpenBenchmarking.org test page.
Learn more via the OpenBenchmarking.org test page.
This test measures the time to decompress a Linux kernel tarball using XZ. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon Platinum 8175M (2 Cores / 4 Threads), Motherboard: Amazon EC2 m5.xlarge (1.0 BIOS), Memory: 16GB, Disk: 9GB Amazon Elastic Block Store + 107GB Amazon Elastic Block Store
OS: Debian GNU/Linux 10, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 8.3.0, File-System: overlayfs, System Layer: container-other
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x2000069
Disk Scheduler Notes: NONE
Java Notes: OpenJDK Runtime Environment (build 11.0.7+10-post-Debian-3deb10u1)
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 8 June 2020 07:52 by user root.
Processor: Intel Xeon Platinum 8175M (2 Cores / 4 Threads), Motherboard: Amazon EC2 m5.xlarge (1.0 BIOS), Memory: 16GB, Disk: 9GB Amazon Elastic Block Store + 107GB Amazon Elastic Block Store
OS: CentOS Linux 7, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: overlayfs, System Layer: KVM
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x2000069
Disk Scheduler Notes: NONE
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 8 June 2020 14:47 by user .