pve.bare.nvm2.fs.h4.tio.run-1 pve.bare.nvm2.fs.h4.tio.run-1
Compare your own system(s) to this result file with the
Phoronix Test Suite by running the command:
phoronix-test-suite benchmark 2009070-DROP-PVEBARE83 pve.bare.nvm2.fs.h4.tio.run-1 Processor: Intel Xeon Gold 6136 @ 3.70GHz (12 Cores / 24 Threads), Motherboard: Supermicro X11DPH-i v1.01 (3.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 126GB, Disk: 960GB KINGSTON SKC1000960G + 2048GB Samsung SSD 960 PRO 2TB + 960GB SMC3108 + 31GB USB Flash Drive + Transcend 2GB, Graphics: ASPEED, Network: 2 x Intel X722 for 1GbE + 4 x Intel X710/X557-AT
OS: Debian GNU/Linux 10, Kernel: 5.4.44-2-pve (x86_64), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -vDisk Notes: NONE / attr2,inode64,logbsize=32k,logbufs=8,noatime,noquota,rwProcessor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000065Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
pve.bare.nvm2.fs.h4.tio.run-1 OpenBenchmarking.org Phoronix Test Suite Intel Xeon Gold 6136 @ 3.70GHz (12 Cores / 24 Threads) Supermicro X11DPH-i v1.01 (3.2 BIOS) Intel Sky Lake-E DMI3 Registers 126GB 960GB KINGSTON SKC1000960G + 2048GB Samsung SSD 960 PRO 2TB + 960GB SMC3108 + 31GB USB Flash Drive + Transcend 2GB ASPEED 2 x Intel X722 for 1GbE + 4 x Intel X710/X557-AT Debian GNU/Linux 10 5.4.44-2-pve (x86_64) GCC 8.3.0 xfs 1024x768 Processor Motherboard Chipset Memory Disk Graphics Network OS Kernel Compiler File-System Screen Resolution Pve.bare.nvm2.fs.h4.tio.run-1 Benchmarks System Logs - --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v - NONE / attr2,inode64,logbsize=32k,logbufs=8,noatime,noquota,rw - Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000065 - itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
pve.bare.nvm2.fs.h4.tio.run-1 tiobench: Rand Read - 256MB - 16 tiobench: Rand Write - 256MB - 32 tiobench: Rand Read - 256MB - 32 tiobench: Write - 256MB - 32 tiobench: Read - 256MB - 32 tiobench: Rand Read - 256MB - 8 tiobench: Write - 256MB - 8 tiobench: Rand Write - 256MB - 16 tiobench: Read - 256MB - 16 tiobench: Write - 256MB - 16 tiobench: Read - 256MB - 4 tiobench: Rand Write - 128MB - 32 tiobench: Rand Read - 128MB - 32 tiobench: Read - 128MB - 32 tiobench: Write - 128MB - 32 tiobench: Write - 128MB - 8 tiobench: Read - 64MB - 16 tiobench: Read - 128MB - 8 tiobench: Rand Read - 32MB - 32 tiobench: Write - 64MB - 8 tiobench: Read - 256MB - 8 tiobench: Rand Write - 128MB - 16 tiobench: Rand Write - 256MB - 8 tiobench: Rand Read - 32MB - 16 tiobench: Rand Read - 128MB - 16 tiobench: Read - 128MB - 16 tiobench: Write - 128MB - 16 tiobench: Rand Write - 64MB - 32 tiobench: Rand Read - 64MB - 32 tiobench: Write - 64MB - 32 tiobench: Read - 64MB - 32 tiobench: Rand Read - 32MB - 8 tiobench: Write - 32MB - 8 tiobench: Rand Write - 256MB - 4 tiobench: Read - 64MB - 4 tiobench: Rand Read - 256MB - 4 tiobench: Write - 256MB - 4 tiobench: Rand Write - 128MB - 8 tiobench: Rand Read - 128MB - 8 tiobench: Rand Write - 64MB - 16 tiobench: Rand Read - 64MB - 16 tiobench: Read - 32MB - 16 tiobench: Write - 64MB - 16 tiobench: Rand Write - 32MB - 32 tiobench: Read - 32MB - 32 tiobench: Write - 32MB - 32 tiobench: Read - 32MB - 8 tiobench: Rand Write - 128MB - 4 tiobench: Rand Read - 128MB - 4 tiobench: Read - 128MB - 4 tiobench: Write - 128MB - 4 tiobench: Rand Read - 64MB - 8 tiobench: Rand Write - 64MB - 8 tiobench: Read - 64MB - 8 tiobench: Rand Write - 32MB - 16 tiobench: Write - 32MB - 16 tiobench: Rand Write - 64MB - 4 tiobench: Rand Read - 64MB - 4 tiobench: Write - 64MB - 4 tiobench: Rand Write - 32MB - 8 tiobench: Rand Write - 32MB - 4 tiobench: Read - 32MB - 4 tiobench: Rand Read - 32MB - 4 tiobench: Write - 32MB - 4 pve.bare.nvm2.fs.h4.tio.run-1 348166.491 436.464 540236.412 3.095 29366.305 214407.940 2.450 266.736 30401.116 2.620 17060.769 219.781 270727.952 28901.515 3.112 2.393 28193.828 24222.944 77730.630 2.284 27258.490 133.292 214.817 49450.939 179319.279 30148.389 2.559 109.502 134277.892 3.086 28667.181 28521.473 2.268 131.407 12490.829 102026.628 2.055 105.132 99758.547 66.752 90366.010 22348.469 2.565 54.782 28440.230 3.111 15010.099 66.633 53012.201 15086.424 2.037 50094.238 53.271 20574.625 33.399 2.537 33.370 25968.234 2.065 26.414 16.638 8592.748 13067.525 2.021 OpenBenchmarking.org
pve.bare.nvm2.fs.h4.tio.run-1 Processor: Intel Xeon Gold 6136 @ 3.70GHz (12 Cores / 24 Threads), Motherboard: Supermicro X11DPH-i v1.01 (3.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 126GB, Disk: 960GB KINGSTON SKC1000960G + 2048GB Samsung SSD 960 PRO 2TB + 960GB SMC3108 + 31GB USB Flash Drive + Transcend 2GB, Graphics: ASPEED, Network: 2 x Intel X722 for 1GbE + 4 x Intel X710/X557-AT
OS: Debian GNU/Linux 10, Kernel: 5.4.44-2-pve (x86_64), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -vDisk Notes: NONE / attr2,inode64,logbsize=32k,logbufs=8,noatime,noquota,rwProcessor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000065Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 5 September 2020 07:37 by user dropchopbenchmark.