2021-06-03-0851

Xen HVM domU 4.11.amazon testing on Amazon Linux 2 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2106031-IB-20210603078.

2021-06-03-0851ProcessorMotherboardMemoryDiskOSKernelCompilerFile-SystemSystem LayerIntel Xeon E5-2686 v4Intel Xeon E5-2686 v4 (1 Core / 2 Threads)Xen HVM domU (4.11.amazon BIOS)8GB8GBAmazon Linux 24.14.231-173.361.amzn2.x86_64 (x86_64)GCC 7.3.1 20180712xfsXen HVM domU 4.11.amazonOpenBenchmarking.org- Transparent Huge Pages: madvise- --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic - NOOP / attr2,inode64,noatime,noquota,rw,seclabel / Block Size: 4096 - CPU Microcode: 0xb000038- itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected

2021-06-03-0851aio-stress: AIO Stresspostmark: Server Disk Simulationramspeed: Floating-Point Additionstream: Memory Copysockperf: Network Throughputsockperf: Network Latency Ping-Pongjohn-the-ripper: Blowfish Brute-forceopenssl: OpenSSL SignaturesIntel Xeon E5-2686 v4993.6428299221.7615458.422033416.9321161126.3OpenBenchmarking.org

AIO-Stress

AIO Stress

OpenBenchmarking.orgMB/s, More Is BetterAIO-Stress 0.21AIO StressIntel Xeon E5-2686 v42004006008001000SE +/- 3.05, N = 3993.641. (CC) gcc options: -pthread -laio

PostMark

Server Disk Simulation

OpenBenchmarking.orgTPS, More Is BetterPostMark 1.51Server Disk SimulationIntel Xeon E5-2686 v46001200180024003000SE +/- 10.67, N = 328291. (CC) gcc options: -O3

RAMspeed SMP

Floating-Point Addition

OpenBenchmarking.orgMB/s, More Is BetterRAMspeed SMP 3.5.0Floating-Point AdditionIntel Xeon E5-2686 v42K4K6K8K10K9221.761. (CC) gcc options: -O3 -march=native

Stream

Memory Copy

OpenBenchmarking.orgMB/s, More Is BetterStream 2013-01-17Memory CopyIntel Xeon E5-2686 v43K6K9K12K15KSE +/- 139.82, N = 715458.41. (CC) gcc options: -O3 -march=native -fopenmp

Sockperf

Network Throughput

OpenBenchmarking.orgMessages Per Second, More Is BetterSockperf 3.4Network ThroughputIntel Xeon E5-2686 v450K100K150K200K250KSE +/- 470.15, N = 52203341. (CXX) g++ options: --param -O3 -rdynamic -ldl -lpthread

Sockperf

Network Latency Ping-Pong

OpenBenchmarking.orgusec, Fewer Is BetterSockperf 3.4Network Latency Ping-PongIntel Xeon E5-2686 v448121620SE +/- 0.13, N = 516.931. (CXX) g++ options: --param -O3 -rdynamic -ldl -lpthread

John The Ripper

Blowfish Brute-force

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0-jumbo-1Blowfish Brute-forceIntel Xeon E5-2686 v42004006008001000SE +/- 9.77, N = 311611. (CC) gcc options: -lssl -lcrypto -fopenmp -pthread -lm -lz -ldl -lcrypt

OpenSSL

OpenSSL Signatures

OpenBenchmarking.orgSigns Per Second, More Is BetterOpenSSL 1.1.1OpenSSL SignaturesIntel Xeon E5-2686 v4306090120150SE +/- 0.25, N = 3126.31. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl


Phoronix Test Suite v10.8.4