yyy_result with agent only file grop kprobes is anabled "kprobes_file-chmod_enabled": "kprobes_file-close-write_enabled": "kprobes_file-creation_enabled": "kprobes_file-delete_enabled": "kprobes_file-move_enabled":
HTML result view exported from: https://openbenchmarking.org/result/2009137-AS-YYYRESULT99 .
yyy_result Processor Motherboard Chipset Memory Disk Graphics Network OS Kernel Compiler File-System Screen Resolution System Layer yyy_run run1 run2 run3 run4_no_agent run5_no_agent run6_no_agent run7_no_agent run8_yes_agent run9_yes_agent_no_execv_kprobe run10_yes_agent_disable_all_kprobes run11_yes_agent_enable_execv_kprobe_only run12_enable_only_file_group_kprobes 2 x Intel Xeon Gold 6248R (3 Cores) Intel 440BX (6.00 BIOS) Intel 440BX/ZX/DX 2048 MB + 1024 MB DRAM 11GB Virtual disk VMware SVGA II VMware VMXNET3 CentOS Linux 7 3.10.0-1062.el7.x86_64 (x86_64) GCC 4.8.5 20150623 xfs 1176x885 VMware 16 x Intel Xeon Gold 6248R (31 Cores) 1 x 16384 MB DRAM 16GB Virtual disk 3.10.0-1127.19.1.el7.x86_64 (x86_64) OpenBenchmarking.org Compiler Details - --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic Security Details - yyy_run: SELinux + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB - run1: SELinux + itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Not affected - run2: SELinux + itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Not affected - run3: SELinux + itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Not affected - run4_no_agent: SELinux + itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Not affected - run5_no_agent: SELinux + itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Not affected - run6_no_agent: SELinux + itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Not affected - run7_no_agent: SELinux + itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Not affected - run8_yes_agent: SELinux + itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Not affected - run9_yes_agent_no_execv_kprobe: SELinux + itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Not affected - run10_yes_agent_disable_all_kprobes: SELinux + itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Not affected - run11_yes_agent_enable_execv_kprobe_only: SELinux + itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Not affected - run12_enable_only_file_group_kprobes: SELinux + itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Not affected
yyy_result nginx: Static Web Page Serving Difference Standard Error Standard Deviation yyy_run run1 run2 run3 run4_no_agent run5_no_agent run6_no_agent run7_no_agent run8_yes_agent run9_yes_agent_no_execv_kprobe run10_yes_agent_disable_all_kprobes run11_yes_agent_enable_execv_kprobe_only run12_enable_only_file_group_kprobes 12613.80 1.00x 911.80 25.04% 16761.66 1.33x 17.67 0.18% 16769.81 1.33x 52.25 0.54% 16978.93 1.35x 182.02 1.86% 22958.12 1.82x 81.51 0.61% 22217.13 1.76x 79.22 0.62% 22648.85 1.80x 182.20 1.39% 22203.72 1.76x 147.67 1.15% 16769.48 1.33x 83.13 0.86% 16732.31 1.33x 18.76 0.19% 20366.47 1.61x 45.18 0.38% 20500.82 1.63x 91.37 0.77% 16156.45 1.28x 45.85 0.49% OpenBenchmarking.org
NGINX Benchmark Static Web Page Serving OpenBenchmarking.org Requests Per Second, More Is Better NGINX Benchmark 1.9.9 Static Web Page Serving yyy_run run1 run2 run3 run4_no_agent run5_no_agent run6_no_agent run7_no_agent run8_yes_agent run9_yes_agent_no_execv_kprobe run10_yes_agent_disable_all_kprobes run11_yes_agent_enable_execv_kprobe_only run12_enable_only_file_group_kprobes 5K 10K 15K 20K 25K SE +/- 911.80, N = 12 SE +/- 17.67, N = 3 SE +/- 52.25, N = 3 SE +/- 182.02, N = 3 SE +/- 81.51, N = 3 SE +/- 79.22, N = 3 SE +/- 182.20, N = 3 SE +/- 147.67, N = 3 SE +/- 83.13, N = 3 SE +/- 18.76, N = 3 SE +/- 45.18, N = 3 SE +/- 91.37, N = 3 SE +/- 45.85, N = 3 12613.80 16761.66 16769.81 16978.93 22958.12 22217.13 22648.85 22203.72 16769.48 16732.31 20366.47 20500.82 16156.45 1. (CC) gcc options: -lpthread -lcrypt -lcrypto -lz -O3 -march=native
Phoronix Test Suite v10.8.4