compilebench-all-novm
KVM testing on Ubuntu 20.04 via the Phoronix Test Suite.
2 x 1000GB SHGP31-1000GM-2
Processor: 2 x Intel Xeon E5530 (8 Cores / 16 Threads), Motherboard: Dell 0YDJK3 (6.6.0 BIOS), Chipset: Intel 5520 I/O + ICH9, Memory: 18 x 8192 MB DDR3-1066MT/s M393B1K70CHD-CF8, Disk: 2 x 1000GB SHGP31-1000GM-2 + 500GB CT500MX500SSD1 + 1000GB PERC 6/i, Graphics: Matrox MGA G200eW WPCM450, Monitor: ASUS VW266H, Network: 4 x Broadcom NetXtreme II BCM5709
OS: Debian GNU/Linux 10, Kernel: 5.4.106-1-pve (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1280x1024
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / errors=remount-ro,relatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x1d
Python Notes: Python 2.7.16 + Python 3.7.3
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
QEMU HDD
Processor: Common KVM (16 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 106GB, Disk: 206GB QEMU HDD, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 20.04, Kernel: 5.4.0-77-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / relatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x1
Python Notes: Python 3.8.5
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Compile Bench
Compilebench tries to age a filesystem by simulating some of the disk IO common in creating, compiling, patching, stating and reading kernel trees. It indirectly measures how well filesystems can maintain directory locality as the disk fills up and directories age. This current test is setup to use the makej mode with 10 initial directories Learn more via the OpenBenchmarking.org test page.
2 x 1000GB SHGP31-1000GM-2
Processor: 2 x Intel Xeon E5530 (8 Cores / 16 Threads), Motherboard: Dell 0YDJK3 (6.6.0 BIOS), Chipset: Intel 5520 I/O + ICH9, Memory: 18 x 8192 MB DDR3-1066MT/s M393B1K70CHD-CF8, Disk: 2 x 1000GB SHGP31-1000GM-2 + 500GB CT500MX500SSD1 + 1000GB PERC 6/i, Graphics: Matrox MGA G200eW WPCM450, Monitor: ASUS VW266H, Network: 4 x Broadcom NetXtreme II BCM5709
OS: Debian GNU/Linux 10, Kernel: 5.4.106-1-pve (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1280x1024
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / errors=remount-ro,relatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x1d
Python Notes: Python 2.7.16 + Python 3.7.3
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 24 June 2021 07:02 by user root.
QEMU HDD
Processor: Common KVM (16 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 106GB, Disk: 206GB QEMU HDD, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 20.04, Kernel: 5.4.0-77-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / relatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x1
Python Notes: Python 3.8.5
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 24 June 2021 14:10 by user staeiou.