2019-09-24-1120
KVM testing on Ubuntu 18.04 via the Phoronix Test Suite.
8 x 16384 MB 2133MHz Samsung M393A2G40EB1-CRC
Processor: 2 x Intel Xeon E5-2630 v4 @ 3.10GHz (20 Cores / 40 Threads), Motherboard: Supermicro X10DRH-CT v1.10 (3.1 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 16384 MB 2133MHz Samsung M393A2G40EB1-CRC, Disk: 2000GB SMC3108, Graphics: ASPEED, Network: 2 x Intel 10-Gigabit X540-AT2
OS: Ubuntu 14.04, Kernel: 4.4.0-148-lowlatency (x86_64), Compiler: GCC 4.8.4, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-browser-plugin --disable-libmudflap --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,c++,java,go,d,fortran,objc,obj-c++ --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB IBRS_FW
2 x Intel 10-Gigabit X540-AT2
Processor: 2 x Intel Xeon E5-2630 v4 @ 3.10GHz (20 Cores / 40 Threads), Motherboard: Supermicro X10DRH-CT v1.01 (3.1 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 129024MB, Disk: 2000GB SMC3108, Graphics: ASPEED, Network: 2 x Intel 10-Gigabit X540-AT2
OS: Ubuntu 18.04, Kernel: 4.15.0-70-lowlatency (x86_64), Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 640x480
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
8 x 16384 MB RAM - Red Hat Virtio device
Processor: 2 x Intel Xeon (16 Cores / 32 Threads), Motherboard: Google Compute Engine, Chipset: Intel 440FX 82441FX PMC, Memory: 8 x 16384 MB RAM, Disk: 2199GB PersistentDisk + 4295GB PersistentDisk, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 5.4.0-1025-gcp (x86_64), Compiler: GCC 7.5.0, File-System: ext4, System Layer: KVM
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT Host state unknown
Redis
Redis is an open-source data structure server. Learn more via the OpenBenchmarking.org test page.
Tinymembench
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Sockperf
This is a network socket API performance benchmark. Learn more via the OpenBenchmarking.org test page.
Tinymembench
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
NGINX Benchmark
This is a test of ab, which is the Apache Benchmark program running against nginx. This test profile measures how many requests per second a given system can sustain when carrying out 2,000,000 requests with 500 requests being carried out concurrently. Learn more via the OpenBenchmarking.org test page.
ctx_clock
Ctx_clock is a simple test program to measure the context switch time in clock cycles. Learn more via the OpenBenchmarking.org test page.
Redis
Redis is an open-source data structure server. Learn more via the OpenBenchmarking.org test page.
8 x 16384 MB 2133MHz Samsung M393A2G40EB1-CRC
Processor: 2 x Intel Xeon E5-2630 v4 @ 3.10GHz (20 Cores / 40 Threads), Motherboard: Supermicro X10DRH-CT v1.10 (3.1 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 16384 MB 2133MHz Samsung M393A2G40EB1-CRC, Disk: 2000GB SMC3108, Graphics: ASPEED, Network: 2 x Intel 10-Gigabit X540-AT2
OS: Ubuntu 14.04, Kernel: 4.4.0-148-lowlatency (x86_64), Compiler: GCC 4.8.4, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-browser-plugin --disable-libmudflap --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,c++,java,go,d,fortran,objc,obj-c++ --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB IBRS_FW
Testing initiated at 24 September 2019 11:20 by user root.
2 x Intel 10-Gigabit X540-AT2
Processor: 2 x Intel Xeon E5-2630 v4 @ 3.10GHz (20 Cores / 40 Threads), Motherboard: Supermicro X10DRH-CT v1.01 (3.1 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 129024MB, Disk: 2000GB SMC3108, Graphics: ASPEED, Network: 2 x Intel 10-Gigabit X540-AT2
OS: Ubuntu 18.04, Kernel: 4.15.0-70-lowlatency (x86_64), Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 640x480
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 2 December 2019 14:46 by user root.
8 x 16384 MB RAM - Red Hat Virtio device
Processor: 2 x Intel Xeon (16 Cores / 32 Threads), Motherboard: Google Compute Engine, Chipset: Intel 440FX 82441FX PMC, Memory: 8 x 16384 MB RAM, Disk: 2199GB PersistentDisk + 4295GB PersistentDisk, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 5.4.0-1025-gcp (x86_64), Compiler: GCC 7.5.0, File-System: ext4, System Layer: KVM
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT Host state unknown
Testing initiated at 8 October 2020 20:48 by user root.