pve.bare.nvm1.fs.h2.tio.run-1 pve.bare.nvm1.fs.h2.tio.run-1
Compare your own system(s) to this result file with the
Phoronix Test Suite by running the command:
phoronix-test-suite benchmark 2009067-DROP-PVEBARE56 pve.bare.nvm1.fs.h2.tio.run-1 Processor: Intel Xeon Gold 6136 @ 3.70GHz (12 Cores / 24 Threads), Motherboard: Supermicro X11DPH-i v1.01 (3.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 126GB, Disk: 960GB KINGSTON SKC1000960G + 2048GB Samsung SSD 960 PRO 2TB + 960GB SMC3108 + 31GB USB Flash Drive + Transcend 2GB, Graphics: ASPEED, Network: 2 x Intel X722 for 1GbE + 4 x Intel X710/X557-AT
OS: Debian GNU/Linux 10, Kernel: 5.4.44-2-pve (x86_64), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -vDisk Notes: NONE / attr2,discard,inode64,logbsize=32k,logbufs=8,noatime,noquota,rwProcessor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000065Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
pve.bare.nvm1.fs.h2.tio.run-1 OpenBenchmarking.org Phoronix Test Suite Intel Xeon Gold 6136 @ 3.70GHz (12 Cores / 24 Threads) Supermicro X11DPH-i v1.01 (3.2 BIOS) Intel Sky Lake-E DMI3 Registers 126GB 960GB KINGSTON SKC1000960G + 2048GB Samsung SSD 960 PRO 2TB + 960GB SMC3108 + 31GB USB Flash Drive + Transcend 2GB ASPEED 2 x Intel X722 for 1GbE + 4 x Intel X710/X557-AT Debian GNU/Linux 10 5.4.44-2-pve (x86_64) GCC 8.3.0 xfs 1024x768 Processor Motherboard Chipset Memory Disk Graphics Network OS Kernel Compiler File-System Screen Resolution Pve.bare.nvm1.fs.h2.tio.run-1 Benchmarks System Logs - --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v - NONE / attr2,discard,inode64,logbsize=32k,logbufs=8,noatime,noquota,rw - Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000065 - itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
pve.bare.nvm1.fs.h2.tio.run-1 tiobench: Read - 32MB - 4 tiobench: Read - 32MB - 8 tiobench: Read - 64MB - 4 tiobench: Read - 64MB - 8 tiobench: Read - 128MB - 4 tiobench: Read - 128MB - 8 tiobench: Read - 256MB - 4 tiobench: Read - 256MB - 8 tiobench: Read - 32MB - 16 tiobench: Read - 32MB - 32 tiobench: Read - 64MB - 16 tiobench: Read - 64MB - 32 tiobench: Write - 32MB - 4 tiobench: Write - 32MB - 8 tiobench: Write - 64MB - 4 tiobench: Write - 64MB - 8 tiobench: Read - 128MB - 16 tiobench: Read - 128MB - 32 tiobench: Read - 256MB - 16 tiobench: Read - 256MB - 32 tiobench: Write - 128MB - 4 tiobench: Write - 128MB - 8 tiobench: Write - 256MB - 4 tiobench: Write - 256MB - 8 tiobench: Write - 32MB - 16 tiobench: Write - 32MB - 32 tiobench: Write - 64MB - 16 tiobench: Write - 64MB - 32 tiobench: Write - 128MB - 16 tiobench: Write - 128MB - 32 tiobench: Write - 256MB - 16 tiobench: Write - 256MB - 32 tiobench: Rand Read - 32MB - 4 tiobench: Rand Read - 32MB - 8 tiobench: Rand Read - 64MB - 4 tiobench: Rand Read - 64MB - 8 tiobench: Rand Read - 128MB - 4 tiobench: Rand Read - 128MB - 8 tiobench: Rand Read - 256MB - 4 tiobench: Rand Read - 256MB - 8 tiobench: Rand Read - 32MB - 16 tiobench: Rand Read - 32MB - 32 tiobench: Rand Read - 64MB - 16 tiobench: Rand Read - 64MB - 32 tiobench: Rand Write - 32MB - 4 tiobench: Rand Write - 32MB - 8 tiobench: Rand Write - 64MB - 4 tiobench: Rand Write - 64MB - 8 tiobench: Rand Read - 128MB - 16 tiobench: Rand Read - 128MB - 32 tiobench: Rand Read - 256MB - 16 tiobench: Rand Read - 256MB - 32 tiobench: Rand Write - 128MB - 4 tiobench: Rand Write - 128MB - 8 tiobench: Rand Write - 256MB - 4 tiobench: Rand Write - 256MB - 8 tiobench: Rand Write - 32MB - 16 tiobench: Rand Write - 32MB - 32 tiobench: Rand Write - 64MB - 16 tiobench: Rand Write - 64MB - 32 tiobench: Rand Write - 128MB - 16 tiobench: Rand Write - 128MB - 32 tiobench: Rand Write - 256MB - 16 tiobench: Rand Write - 256MB - 32 pve.bare.nvm1.fs.h2.tio.run-1 12859.378 21330.030 15207.486 24081.656 16126.902 25172.825 18238.272 25726.553 28038.785 27139.334 28486.114 27776.976 5.247 5.961 5.266 5.982 28881.891 27627.887 29441.340 28147.676 5.284 6.224 5.321 6.459 6.607 7.276 6.492 7.198 6.515 7.231 6.518 7.156 32991.762 66171.730 70992.921 107316.316 128096.927 240376.837 250850.193 469526.858 106537.129 125296.832 197614.810 253414.338 259.025 389.527 1066.981 1089.577 418822.453 527917.808 790842.161 992292.921 1019.524 1067.291 2049.063 2263.579 285.066 457.971 563.589 893.770 1149.563 1804.460 2295.522 3705.574 OpenBenchmarking.org
pve.bare.nvm1.fs.h2.tio.run-1 Processor: Intel Xeon Gold 6136 @ 3.70GHz (12 Cores / 24 Threads), Motherboard: Supermicro X11DPH-i v1.01 (3.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 126GB, Disk: 960GB KINGSTON SKC1000960G + 2048GB Samsung SSD 960 PRO 2TB + 960GB SMC3108 + 31GB USB Flash Drive + Transcend 2GB, Graphics: ASPEED, Network: 2 x Intel X722 for 1GbE + 4 x Intel X710/X557-AT
OS: Debian GNU/Linux 10, Kernel: 5.4.44-2-pve (x86_64), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -vDisk Notes: NONE / attr2,discard,inode64,logbsize=32k,logbufs=8,noatime,noquota,rwProcessor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000065Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 5 September 2020 07:35 by user dropchopbenchmark.