2021-06-03-1200

Xen HVM domU 4.11.amazon testing on Amazon Linux 2 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2106036-HA-20210603174.

2021-06-03-1200ProcessorMotherboardMemoryDiskOSKernelCompilerFile-SystemSystem LayerIntel Xeon E5-2686 v4Intel Xeon E5-2686 v4 (1 Core / 2 Threads)Xen HVM domU (4.11.amazon BIOS)8GB8GBAmazon Linux 24.14.231-173.361.amzn2.x86_64 (x86_64)GCC 7.3.1 20180712xfsXen HVM domU 4.11.amazonOpenBenchmarking.org- --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic - NOOP / attr2,inode64,noatime,noquota,rw,seclabel / Block Size: 4096 - CPU Microcode: 0xb000038- itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected

2021-06-03-1200aio-stress: AIO Stresspostmark: Server Disk Simulationramspeed: Floating-Point Additionstream: Memory Copysockperf: Network Throughputsockperf: Network Latency Ping-Pongjohn-the-ripper: Blowfish Brute-forceopenssl: OpenSSL SignaturesIntel Xeon E5-2686 v4955.5427989273.5115629.822670217.0851159125.0OpenBenchmarking.org

AIO-Stress

AIO Stress

OpenBenchmarking.orgMB/s, More Is BetterAIO-Stress 0.21AIO StressIntel Xeon E5-2686 v42004006008001000SE +/- 1.01, N = 3955.541. (CC) gcc options: -pthread -laio

PostMark

Server Disk Simulation

OpenBenchmarking.orgTPS, More Is BetterPostMark 1.51Server Disk SimulationIntel Xeon E5-2686 v46001200180024003000SE +/- 10.33, N = 327981. (CC) gcc options: -O3

RAMspeed SMP

Floating-Point Addition

OpenBenchmarking.orgMB/s, More Is BetterRAMspeed SMP 3.5.0Floating-Point AdditionIntel Xeon E5-2686 v42K4K6K8K10K9273.511. (CC) gcc options: -O3 -march=native

Stream

Memory Copy

OpenBenchmarking.orgMB/s, More Is BetterStream 2013-01-17Memory CopyIntel Xeon E5-2686 v43K6K9K12K15KSE +/- 9.13, N = 515629.81. (CC) gcc options: -O3 -march=native -fopenmp

Sockperf

Network Throughput

OpenBenchmarking.orgMessages Per Second, More Is BetterSockperf 3.4Network ThroughputIntel Xeon E5-2686 v450K100K150K200K250KSE +/- 980.74, N = 52267021. (CXX) g++ options: --param -O3 -rdynamic -ldl -lpthread

Sockperf

Network Latency Ping-Pong

OpenBenchmarking.orgusec, Fewer Is BetterSockperf 3.4Network Latency Ping-PongIntel Xeon E5-2686 v448121620SE +/- 0.07, N = 2517.091. (CXX) g++ options: --param -O3 -rdynamic -ldl -lpthread

John The Ripper

Blowfish Brute-force

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0-jumbo-1Blowfish Brute-forceIntel Xeon E5-2686 v42004006008001000SE +/- 11.06, N = 311591. (CC) gcc options: -lssl -lcrypto -fopenmp -pthread -lm -lz -ldl -lcrypt

OpenSSL

OpenSSL Signatures

OpenBenchmarking.orgSigns Per Second, More Is BetterOpenSSL 1.1.1OpenSSL SignaturesIntel Xeon E5-2686 v4306090120150SE +/- 1.47, N = 3125.01. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl


Phoronix Test Suite v10.8.4