cachedthinlv
2 x Intel Xeon E5-2620 v4 testing with a Dell 0WCJNT (2.11.0 BIOS) and Matrox G200eR2 on CentOS Linux 8 via the Phoronix Test Suite.
cached_thin_lv
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Disk Notes: NONE / attr2,inode64,noquota,relatime,rw,seclabel,sunit=131072,swidth=131072
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xb000038
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
ADATA SX8200PNP
Processor: 2 x Intel Xeon E5-2620 v4 @ 3.00GHz (16 Cores / 32 Threads), Motherboard: Dell 0WCJNT (2.11.0 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 6 x 32 GB DDR4-2400MT/s 36ASF4G72PZ-2G3B1, Disk: 1024GB ADATA SX8200PNP + 2 x 400GB MZ7KM400HAHP00D3 + 12 x 4000GB PERC H730P Mini, Graphics: Matrox G200eR2, Network: 2 x Intel 10-Gigabit X540-AT2 + 2 x Intel I350
OS: CentOS Linux 8, Kernel: 4.18.0-193.19.1.el8_2.x86_64 (x86_64), Compiler: GCC 8.3.1 20191121, File-System: xfs, Screen Resolution: 1024x768
cached_thin_lv_ext4
OS: CentOS Linux 8, Kernel: 4.18.0-193.19.1.el8_2.x86_64 (x86_64), Compiler: GCC 8.3.1 20191121, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Disk Notes: NONE / relatime,rw,seclabel,stripe=16384
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xb000038
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Flexible IO Tester
Fio is an advanced disk benchmark that depends upon the kernel's AIO access library. Learn more via the OpenBenchmarking.org test page.
FS-Mark
FS_Mark is designed to test a system's file-system performance. Learn more via the OpenBenchmarking.org test page.
Flexible IO Tester
Fio is an advanced disk benchmark that depends upon the kernel's AIO access library. Learn more via the OpenBenchmarking.org test page.
FS-Mark
FS_Mark is designed to test a system's file-system performance. Learn more via the OpenBenchmarking.org test page.
Flexible IO Tester
Fio is an advanced disk benchmark that depends upon the kernel's AIO access library. Learn more via the OpenBenchmarking.org test page.
FS-Mark
FS_Mark is designed to test a system's file-system performance. Learn more via the OpenBenchmarking.org test page.
cached_thin_lv
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Disk Notes: NONE / attr2,inode64,noquota,relatime,rw,seclabel,sunit=131072,swidth=131072
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xb000038
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 22 October 2020 18:28 by user .
ADATA SX8200PNP
Processor: 2 x Intel Xeon E5-2620 v4 @ 3.00GHz (16 Cores / 32 Threads), Motherboard: Dell 0WCJNT (2.11.0 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 6 x 32 GB DDR4-2400MT/s 36ASF4G72PZ-2G3B1, Disk: 1024GB ADATA SX8200PNP + 2 x 400GB MZ7KM400HAHP00D3 + 12 x 4000GB PERC H730P Mini, Graphics: Matrox G200eR2, Network: 2 x Intel 10-Gigabit X540-AT2 + 2 x Intel I350
OS: CentOS Linux 8, Kernel: 4.18.0-193.19.1.el8_2.x86_64 (x86_64), Compiler: GCC 8.3.1 20191121, File-System: xfs, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Disk Notes: NONE / attr2,inode64,noquota,relatime,rw,seclabel,sunit=131072,swidth=131072
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xb000038
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 23 October 2020 16:11 by user baoboa.
cached_thin_lv_ext4
Processor: 2 x Intel Xeon E5-2620 v4 @ 3.00GHz (16 Cores / 32 Threads), Motherboard: Dell 0WCJNT (2.11.0 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 6 x 32 GB DDR4-2400MT/s 36ASF4G72PZ-2G3B1, Disk: 1024GB ADATA SX8200PNP + 2 x 400GB MZ7KM400HAHP00D3 + 12 x 4000GB PERC H730P Mini, Graphics: Matrox G200eR2, Network: 2 x Intel 10-Gigabit X540-AT2 + 2 x Intel I350
OS: CentOS Linux 8, Kernel: 4.18.0-193.19.1.el8_2.x86_64 (x86_64), Compiler: GCC 8.3.1 20191121, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Disk Notes: NONE / relatime,rw,seclabel,stripe=16384
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xb000038
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 23 October 2020 17:25 by user baoboa.