compilebench-ext4-btrfs-xfs-zfs
VMware testing on Ubuntu 20.04 via the Phoronix Test Suite.
zfs vNVMe
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB VMware Virtual NVMe Disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x43
Disk Scheduler Notes: NONE
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
ext4 vNVMe
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / noatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
btrfs vNVMe
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: btrfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / noatime,rw,space_cache,ssd,subvol=/,subvolid=5 / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
xfs vNVMe
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: xfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / attr2,inode64,logbsize=32k,logbufs=8,noatime,rw,usrquota / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
zfs pvSCSI
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x43
Disk Scheduler Notes: MQ-DEADLINE
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
ext4 pvSCSI
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / noatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
btrfs pvSCSI
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: btrfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / noatime,rw,space_cache,ssd,subvol=/,subvolid=5 / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
xfs pvSCSI
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: xfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noatime,rw,usrquota / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Compile Bench
Compilebench tries to age a filesystem by simulating some of the disk IO common in creating, compiling, patching, stating and reading kernel trees. It indirectly measures how well filesystems can maintain directory locality as the disk fills up and directories age. This current test is setup to use the makej mode with 10 initial directories Learn more via the OpenBenchmarking.org test page.
zfs vNVMe
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB VMware Virtual NVMe Disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x43
Disk Scheduler Notes: NONE
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 July 2021 23:36 by user common.
ext4 vNVMe
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB VMware Virtual NVMe Disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / noatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 July 2021 23:58 by user common.
btrfs vNVMe
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB VMware Virtual NVMe Disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: btrfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / noatime,rw,space_cache,ssd,subvol=/,subvolid=5 / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 July 2021 00:10 by user common.
xfs vNVMe
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB VMware Virtual NVMe Disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: xfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: NONE / attr2,inode64,logbsize=32k,logbufs=8,noatime,rw,usrquota / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 July 2021 00:13 by user common.
zfs pvSCSI
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x43
Disk Scheduler Notes: MQ-DEADLINE
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 July 2021 00:54 by user common.
ext4 pvSCSI
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / noatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 July 2021 00:59 by user common.
btrfs pvSCSI
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: btrfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / noatime,rw,space_cache,ssd,subvol=/,subvolid=5 / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 July 2021 01:09 by user common.
xfs pvSCSI
Processor: 2 x Intel Xeon E5-2630 v3 (32 Cores), Motherboard: Intel 440BX (VMW71.00V.16707776.B64.2008070230 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 158GB, Disk: 2 x 644GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.8.0-59-generic (x86_64), Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: xfs, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noatime,rw,usrquota / Block Size: 4096
Processor Notes: CPU Microcode: 0x43
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: flush not necessary SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 July 2021 01:13 by user common.