m5.2xl-memory
KVM testing on Ubuntu 18.04 via the Phoronix Test Suite.
m5.2xl-memory
Processor: Intel Xeon Platinum 8255C (8 Cores), Motherboard: Smdbmds KVM v3.0 (seabios-1.9.1-qemu-project.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 4 x 16384 MB RAM Smdbmds, Disk: 99GB, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 4.15.0-112-generic (x86_64), Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
RAMspeed SMP
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Tinymembench
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
MBW
This is a basic/simple memory (RAM) bandwidth benchmark for memory copy operations. Learn more via the OpenBenchmarking.org test page.
t-test1
This is a test of t-test1 for basic memory allocator benchmarks. Note this test profile is currently very basic and the overall time does include the warmup time of the custom t-test1 compilation. Improvements welcome. Learn more via the OpenBenchmarking.org test page.
CacheBench
This is a performance test of CacheBench, which is part of LLCbench. CacheBench is designed to test the memory and cache bandwidth performance Learn more via the OpenBenchmarking.org test page.
m5.2xl-memory
Processor: Intel Xeon Platinum 8255C (8 Cores), Motherboard: Smdbmds KVM v3.0 (seabios-1.9.1-qemu-project.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 4 x 16384 MB RAM Smdbmds, Disk: 99GB, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 4.15.0-112-generic (x86_64), Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 30 August 2020 04:37 by user root.