pve.bare.nvm2.fs.h4.tio.run-1 pve.bare.nvm2.fs.h4.tio.run-1
Compare your own system(s) to this result file with the
Phoronix Test Suite by running the command:
phoronix-test-suite benchmark 2009070-DROP-PVEBARE83 pve.bare.nvm2.fs.h4.tio.run-1 Processor: Intel Xeon Gold 6136 @ 3.70GHz (12 Cores / 24 Threads), Motherboard: Supermicro X11DPH-i v1.01 (3.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 126GB, Disk: 960GB KINGSTON SKC1000960G + 2048GB Samsung SSD 960 PRO 2TB + 960GB SMC3108 + 31GB USB Flash Drive + Transcend 2GB, Graphics: ASPEED, Network: 2 x Intel X722 for 1GbE + 4 x Intel X710/X557-AT
OS: Debian GNU/Linux 10, Kernel: 5.4.44-2-pve (x86_64), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -vDisk Notes: NONE / attr2,inode64,logbsize=32k,logbufs=8,noatime,noquota,rwProcessor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000065Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
pve.bare.nvm2.fs.h4.tio.run-1 OpenBenchmarking.org Phoronix Test Suite Intel Xeon Gold 6136 @ 3.70GHz (12 Cores / 24 Threads) Supermicro X11DPH-i v1.01 (3.2 BIOS) Intel Sky Lake-E DMI3 Registers 126GB 960GB KINGSTON SKC1000960G + 2048GB Samsung SSD 960 PRO 2TB + 960GB SMC3108 + 31GB USB Flash Drive + Transcend 2GB ASPEED 2 x Intel X722 for 1GbE + 4 x Intel X710/X557-AT Debian GNU/Linux 10 5.4.44-2-pve (x86_64) GCC 8.3.0 xfs 1024x768 Processor Motherboard Chipset Memory Disk Graphics Network OS Kernel Compiler File-System Screen Resolution Pve.bare.nvm2.fs.h4.tio.run-1 Benchmarks System Logs - --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v - NONE / attr2,inode64,logbsize=32k,logbufs=8,noatime,noquota,rw - Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000065 - itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
pve.bare.nvm2.fs.h4.tio.run-1 tiobench: Rand Write - 256MB - 32 tiobench: Rand Write - 256MB - 16 tiobench: Rand Write - 128MB - 32 tiobench: Rand Write - 128MB - 16 tiobench: Rand Write - 64MB - 32 tiobench: Rand Write - 64MB - 16 tiobench: Rand Write - 32MB - 32 tiobench: Rand Write - 32MB - 16 tiobench: Rand Write - 256MB - 8 tiobench: Rand Write - 256MB - 4 tiobench: Rand Write - 128MB - 8 tiobench: Rand Write - 128MB - 4 tiobench: Rand Read - 256MB - 32 tiobench: Rand Read - 128MB - 32 tiobench: Rand Read - 128MB - 16 tiobench: Rand Write - 64MB - 8 tiobench: Rand Write - 64MB - 4 tiobench: Rand Write - 32MB - 8 tiobench: Rand Write - 32MB - 4 tiobench: Rand Read - 64MB - 32 tiobench: Rand Read - 64MB - 16 tiobench: Rand Read - 256MB - 4 tiobench: Rand Read - 128MB - 8 tiobench: Rand Read - 128MB - 4 tiobench: Rand Read - 64MB - 8 tiobench: Rand Read - 64MB - 4 tiobench: Rand Read - 32MB - 4 tiobench: Write - 256MB - 32 tiobench: Write - 256MB - 16 tiobench: Write - 128MB - 32 tiobench: Write - 128MB - 16 tiobench: Write - 64MB - 32 tiobench: Write - 64MB - 16 tiobench: Write - 32MB - 32 tiobench: Write - 32MB - 16 tiobench: Write - 256MB - 8 tiobench: Write - 256MB - 4 tiobench: Write - 128MB - 4 tiobench: Read - 256MB - 32 tiobench: Read - 256MB - 16 tiobench: Read - 128MB - 32 tiobench: Read - 128MB - 16 tiobench: Write - 64MB - 4 tiobench: Write - 32MB - 8 tiobench: Write - 32MB - 4 tiobench: Read - 64MB - 32 tiobench: Read - 64MB - 16 tiobench: Read - 32MB - 32 tiobench: Read - 32MB - 16 tiobench: Read - 256MB - 8 tiobench: Read - 256MB - 4 tiobench: Read - 128MB - 8 tiobench: Read - 128MB - 4 tiobench: Read - 64MB - 8 tiobench: Read - 32MB - 8 tiobench: Read - 32MB - 4 tiobench: Rand Read - 256MB - 16 tiobench: Rand Read - 32MB - 32 tiobench: Rand Read - 32MB - 16 tiobench: Rand Read - 256MB - 8 tiobench: Rand Read - 32MB - 8 tiobench: Write - 128MB - 8 tiobench: Write - 64MB - 8 tiobench: Read - 64MB - 4 pve.bare.nvm2.fs.h4.tio.run-1 436.464 266.736 219.781 133.292 109.502 66.752 54.782 33.399 214.817 131.407 105.132 66.633 540236.412 270727.952 179319.279 53.271 33.370 26.414 16.638 134277.892 90366.010 102026.628 99758.547 53012.201 50094.238 25968.234 13067.525 3.095 2.620 3.112 2.559 3.086 2.565 3.111 2.537 2.450 2.055 2.037 29366.305 30401.116 28901.515 30148.389 2.065 2.268 2.021 28667.181 28193.828 28440.230 22348.469 27258.490 17060.769 24222.944 15086.424 20574.625 15010.099 8592.748 348166.491 77730.630 49450.939 214407.940 28521.473 2.393 2.284 12490.829 OpenBenchmarking.org
pve.bare.nvm2.fs.h4.tio.run-1 Processor: Intel Xeon Gold 6136 @ 3.70GHz (12 Cores / 24 Threads), Motherboard: Supermicro X11DPH-i v1.01 (3.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 126GB, Disk: 960GB KINGSTON SKC1000960G + 2048GB Samsung SSD 960 PRO 2TB + 960GB SMC3108 + 31GB USB Flash Drive + Transcend 2GB, Graphics: ASPEED, Network: 2 x Intel X722 for 1GbE + 4 x Intel X710/X557-AT
OS: Debian GNU/Linux 10, Kernel: 5.4.44-2-pve (x86_64), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -vDisk Notes: NONE / attr2,inode64,logbsize=32k,logbufs=8,noatime,noquota,rwProcessor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000065Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 5 September 2020 07:37 by user dropchopbenchmark.