smallpt-test

KVM testing on Amazon Linux 2 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2107302-IB-2107301IB36.

smallpt-testProcessorMotherboardChipsetMemoryDiskNetworkOSKernelCompilerFile-SystemSystem LayerC5a.8XL-1C5a.8XL-2C5a.8XL-3C5a.8XL-4C5a.8XL-5C5.8XL-1C5.8XL-2C5.8XL-3AMD EPYC 7R32 (16 Cores / 32 Threads)Amazon EC2 c5a.8xlarge (1.0 BIOS)Intel 440FX 82441FX PMC1 x 64 GB DDR4-2933MHz107GB Amazon Elastic Block StoreAmazon ElasticAmazon Linux 24.14.238-182.422.amzn2.x86_64 (x86_64)GCC 7.3.1 20180712xfsKVMIntel Xeon Platinum 8124M (18 Cores / 36 Threads)Amazon EC2 c5.9xlarge (1.0 BIOS)1 x 72 GB DDR4-2666MHzOpenBenchmarking.orgKernel Details- nvme_core.io_timeout=4294967295 - Transparent Huge Pages: madviseCompiler Details- --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic Processor Details- C5a.8XL-1: CPU Microcode: 0x8301034- C5a.8XL-2: CPU Microcode: 0x8301034- C5a.8XL-3: CPU Microcode: 0x8301034- C5a.8XL-4: CPU Microcode: 0x8301034- C5a.8XL-5: CPU Microcode: 0x8301034- C5.8XL-1: CPU Microcode: 0x2006906- C5.8XL-2: CPU Microcode: 0x2006906- C5.8XL-3: CPU Microcode: 0x2006906Security Details- C5a.8XL-1: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected - C5a.8XL-2: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected - C5a.8XL-3: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected - C5a.8XL-4: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected - C5a.8XL-5: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected - C5.8XL-1: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown - C5.8XL-2: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown - C5.8XL-3: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown

smallpt-testsmallpt: Global Illumination Renderer; 128 SamplesDifferenceStandard ErrorStandard DeviationC5a.8XL-1C5a.8XL-2C5a.8XL-3C5a.8XL-4C5a.8XL-5C5.8XL-1C5.8XL-2C5.8XL-37.6791.04x0.071.61%7.8351.02x0.082.36%8.0081.00x0.092.03%7.7551.03x0.102.46%7.8641.02x0.062.98%6.9481.13x0.010.31%6.9901.13x0.072.47%7.0251.12x0.082.49%OpenBenchmarking.org

Smallpt

Global Illumination Renderer; 128 Samples

OpenBenchmarking.orgSeconds, Fewer Is BetterSmallpt 1.0Global Illumination Renderer; 128 SamplesC5a.8XL-1C5a.8XL-2C5a.8XL-3C5a.8XL-4C5a.8XL-5C5.8XL-1C5.8XL-2C5.8XL-3246810SE +/- 0.071, N = 3SE +/- 0.083, N = 5SE +/- 0.094, N = 3SE +/- 0.095, N = 4SE +/- 0.060, N = 15SE +/- 0.012, N = 3SE +/- 0.065, N = 7SE +/- 0.078, N = 57.6797.8358.0087.7557.8646.9486.9907.0251. (CXX) g++ options: -fopenmp -O3


Phoronix Test Suite v10.8.4