pve.bare.nvm1.fs.h2.tio.run-1 pve.bare.nvm1.fs.h2.tio.run-1
Compare your own system(s) to this result file with the
Phoronix Test Suite by running the command:
phoronix-test-suite benchmark 2009067-DROP-PVEBARE56 pve.bare.nvm1.fs.h2.tio.run-1 Processor: Intel Xeon Gold 6136 @ 3.70GHz (12 Cores / 24 Threads), Motherboard: Supermicro X11DPH-i v1.01 (3.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 126GB, Disk: 960GB KINGSTON SKC1000960G + 2048GB Samsung SSD 960 PRO 2TB + 960GB SMC3108 + 31GB USB Flash Drive + Transcend 2GB, Graphics: ASPEED, Network: 2 x Intel X722 for 1GbE + 4 x Intel X710/X557-AT
OS: Debian GNU/Linux 10, Kernel: 5.4.44-2-pve (x86_64), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -vDisk Notes: NONE / attr2,discard,inode64,logbsize=32k,logbufs=8,noatime,noquota,rwProcessor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000065Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
pve.bare.nvm1.fs.h2.tio.run-1 OpenBenchmarking.org Phoronix Test Suite Intel Xeon Gold 6136 @ 3.70GHz (12 Cores / 24 Threads) Supermicro X11DPH-i v1.01 (3.2 BIOS) Intel Sky Lake-E DMI3 Registers 126GB 960GB KINGSTON SKC1000960G + 2048GB Samsung SSD 960 PRO 2TB + 960GB SMC3108 + 31GB USB Flash Drive + Transcend 2GB ASPEED 2 x Intel X722 for 1GbE + 4 x Intel X710/X557-AT Debian GNU/Linux 10 5.4.44-2-pve (x86_64) GCC 8.3.0 xfs 1024x768 Processor Motherboard Chipset Memory Disk Graphics Network OS Kernel Compiler File-System Screen Resolution Pve.bare.nvm1.fs.h2.tio.run-1 Benchmarks System Logs - --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v - NONE / attr2,discard,inode64,logbsize=32k,logbufs=8,noatime,noquota,rw - Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000065 - itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
pve.bare.nvm1.fs.h2.tio.run-1 tiobench: Rand Read - 256MB - 32 tiobench: Rand Write - 256MB - 16 tiobench: Rand Read - 256MB - 16 tiobench: Rand Read - 128MB - 32 tiobench: Write - 256MB - 16 tiobench: Rand Write - 256MB - 32 tiobench: Read - 256MB - 32 tiobench: Write - 256MB - 32 tiobench: Rand Write - 128MB - 16 tiobench: Read - 256MB - 8 tiobench: Write - 256MB - 8 tiobench: Rand Read - 256MB - 8 tiobench: Rand Read - 64MB - 32 tiobench: Rand Write - 128MB - 32 tiobench: Rand Read - 256MB - 4 tiobench: Rand Write - 256MB - 4 tiobench: Rand Read - 128MB - 8 tiobench: Rand Write - 128MB - 8 tiobench: Rand Write - 64MB - 32 tiobench: Rand Write - 256MB - 8 tiobench: Write - 128MB - 8 tiobench: Rand Read - 64MB - 16 tiobench: Rand Write - 64MB - 16 tiobench: Read - 256MB - 16 tiobench: Read - 128MB - 32 tiobench: Write - 128MB - 32 tiobench: Rand Read - 128MB - 16 tiobench: Rand Read - 32MB - 32 tiobench: Read - 128MB - 8 tiobench: Rand Write - 128MB - 4 tiobench: Read - 128MB - 4 tiobench: Rand Read - 128MB - 4 tiobench: Read - 64MB - 8 tiobench: Write - 64MB - 8 tiobench: Rand Read - 32MB - 16 tiobench: Read - 128MB - 16 tiobench: Write - 128MB - 16 tiobench: Rand Write - 32MB - 16 tiobench: Read - 64MB - 32 tiobench: Write - 64MB - 32 tiobench: Read - 32MB - 8 tiobench: Write - 32MB - 8 tiobench: Read - 256MB - 4 tiobench: Write - 256MB - 4 tiobench: Read - 64MB - 16 tiobench: Write - 64MB - 16 tiobench: Rand Write - 64MB - 8 tiobench: Rand Write - 32MB - 8 tiobench: Rand Write - 32MB - 32 tiobench: Read - 32MB - 32 tiobench: Write - 32MB - 32 tiobench: Rand Read - 32MB - 4 tiobench: Rand Write - 32MB - 4 tiobench: Read - 32MB - 4 tiobench: Rand Write - 64MB - 4 tiobench: Read - 64MB - 4 tiobench: Write - 128MB - 4 tiobench: Rand Read - 64MB - 8 tiobench: Read - 32MB - 16 tiobench: Write - 32MB - 16 tiobench: Rand Read - 64MB - 4 tiobench: Write - 64MB - 4 tiobench: Rand Read - 32MB - 8 tiobench: Write - 32MB - 4 pve.bare.nvm1.fs.h2.tio.run-1 992292.921 2295.522 790842.161 527917.808 6.518 3705.574 28147.676 7.156 1149.563 25726.553 6.459 469526.858 253414.338 1804.460 250850.193 2049.063 240376.837 1067.291 893.770 2263.579 6.224 197614.810 563.589 29441.340 27627.887 7.231 418822.453 125296.832 25172.825 1019.524 16126.902 128096.927 24081.656 5.982 106537.129 28881.891 6.515 285.066 27776.976 7.198 21330.030 5.961 18238.272 5.321 28486.114 6.492 1089.577 389.527 457.971 27139.334 7.276 32991.762 259.025 12859.378 1066.981 15207.486 5.284 107316.316 28038.785 6.607 70992.921 5.266 66171.730 5.247 OpenBenchmarking.org
pve.bare.nvm1.fs.h2.tio.run-1 Processor: Intel Xeon Gold 6136 @ 3.70GHz (12 Cores / 24 Threads), Motherboard: Supermicro X11DPH-i v1.01 (3.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 126GB, Disk: 960GB KINGSTON SKC1000960G + 2048GB Samsung SSD 960 PRO 2TB + 960GB SMC3108 + 31GB USB Flash Drive + Transcend 2GB, Graphics: ASPEED, Network: 2 x Intel X722 for 1GbE + 4 x Intel X710/X557-AT
OS: Debian GNU/Linux 10, Kernel: 5.4.44-2-pve (x86_64), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -vDisk Notes: NONE / attr2,discard,inode64,logbsize=32k,logbufs=8,noatime,noquota,rwProcessor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000065Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 5 September 2020 07:35 by user dropchopbenchmark.