1231 september
Intel Xeon E3-1231 v3 testing with a Gigabyte H81M-S1 (FF BIOS) and Sapphire AMD Radeon HD 4550 on Debian 10 via the Phoronix Test Suite.
1
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x12
Python Notes: Python 2.7.16 + Python 3.7.3
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
2
3
Processor: Intel Xeon E3-1231 v3 @ 3.80GHz (4 Cores / 8 Threads), Motherboard: Gigabyte H81M-S1 (FF BIOS), Chipset: Intel Xeon E3-1200 v3 DRAM, Memory: 16GB, Disk: 120GB Samsung SSD 850, Graphics: Sapphire AMD Radeon HD 4550, Audio: Realtek ALC887-VD, Network: Realtek RTL8111/8168/8411
OS: Debian 10, Kernel: 4.19.0-17-amd64 (x86_64), Display Server: X Server 1.20.4, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Apache HTTP Server
This is a test of the Apache HTTPD web server. This Apache HTTPD web server benchmark test profile makes use of the Golang "Bombardier" program for facilitating the HTTP requests over a fixed period time with a configurable number of concurrent clients. Learn more via the OpenBenchmarking.org test page.
Concurrent Requests: 1
1: ./apache: 2: ./apache: /go/bin/bombardier: not found
2: ./apache: 2: ./apache: /go/bin/bombardier: not found
3: ./apache: 2: ./apache: /go/bin/bombardier: not found
Concurrent Requests: 20
1: ./apache: 2: ./apache: /go/bin/bombardier: not found
2: ./apache: 2: ./apache: /go/bin/bombardier: not found
3: ./apache: 2: ./apache: /go/bin/bombardier: not found
Concurrent Requests: 100
1: ./apache: 2: ./apache: /go/bin/bombardier: not found
2: ./apache: 2: ./apache: /go/bin/bombardier: not found
3: ./apache: 2: ./apache: /go/bin/bombardier: not found
Concurrent Requests: 200
1: ./apache: 2: ./apache: /go/bin/bombardier: not found
2: ./apache: 2: ./apache: /go/bin/bombardier: not found
3: ./apache: 2: ./apache: /go/bin/bombardier: not found
Concurrent Requests: 500
1: ./apache: 2: ./apache: /go/bin/bombardier: not found
2: ./apache: 2: ./apache: /go/bin/bombardier: not found
3: ./apache: 2: ./apache: /go/bin/bombardier: not found
Google SynthMark
SynthMark is a cross platform tool for benchmarking CPU performance under a variety of real-time audio workloads. It uses a polyphonic synthesizer model to provide standardized tests for latency, jitter and computational throughput. Learn more via the OpenBenchmarking.org test page.
JPEG XL Decoding libjxl
The JPEG XL Image Coding System is designed to provide next-generation JPEG image capabilities with JPEG XL offering better image quality and compression over legacy JPEG. This test profile is suited for JPEG XL decode performance testing to PNG output file, the pts/jpexl test is for encode performance. The JPEG XL encoding/decoding is done using the libjxl codebase. Learn more via the OpenBenchmarking.org test page.
JPEG XL libjxl
The JPEG XL Image Coding System is designed to provide next-generation JPEG image capabilities with JPEG XL offering better image quality and compression over legacy JPEG. This test profile is currently focused on the multi-threaded JPEG XL image encode performance using the reference libjxl library. Learn more via the OpenBenchmarking.org test page.
KeyDB
A benchmark of KeyDB as a multi-threaded fork of the Redis server. The KeyDB benchmark is conducted using memtier-benchmark. Learn more via the OpenBenchmarking.org test page.
Natron
Natron is an open-source, cross-platform compositing software for visual effects (VFX) and motion graphics. Learn more via the OpenBenchmarking.org test page.
NCNN
NCNN is a high performance neural network inference framework optimized for mobile and other platforms developed by Tencent. Learn more via the OpenBenchmarking.org test page.
nginx
This is a benchmark of the lightweight Nginx HTTP(S) web-server. This Nginx web server benchmark test profile makes use of the Golang "Bombardier" program for facilitating the HTTP requests over a fixed period time with a configurable number of concurrent clients. Learn more via the OpenBenchmarking.org test page.
Concurrent Requests: 1
1: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
2: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
3: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
Concurrent Requests: 20
1: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
2: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
3: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
Concurrent Requests: 100
1: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
2: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
3: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
Concurrent Requests: 200
1: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
2: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
3: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
Concurrent Requests: 500
1: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
2: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
3: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
Concurrent Requests: 1000
1: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
2: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
3: ./nginx: 2: ./nginx: /go/bin/bombardier: not found
OpenSSL
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test profile makes use of the built-in "openssl speed" benchmarking capabilities. Learn more via the OpenBenchmarking.org test page.
Stress-NG
Stress-NG is a Linux stress tool developed by Colin King of Canonical. Learn more via the OpenBenchmarking.org test page.
Test: IO_uring
1: Test failed to run.
2: Test failed to run.
3: Test failed to run.
Tachyon
This is a test of the threaded Tachyon, a parallel ray-tracing system, measuring the time to ray-trace a sample scene. Learn more via the OpenBenchmarking.org test page.
Timed Linux Kernel Compilation
This test times how long it takes to build the Linux kernel in a default configuration (defconfig) for the architecture being tested. Learn more via the OpenBenchmarking.org test page.
YafaRay
YafaRay is an open-source physically based montecarlo ray-tracing engine. Learn more via the OpenBenchmarking.org test page.
1
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x12
Python Notes: Python 2.7.16 + Python 3.7.3
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 16 September 2021 15:36 by user phoronix.
2
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x12
Python Notes: Python 2.7.16 + Python 3.7.3
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 16 September 2021 17:02 by user phoronix.
3
Processor: Intel Xeon E3-1231 v3 @ 3.80GHz (4 Cores / 8 Threads), Motherboard: Gigabyte H81M-S1 (FF BIOS), Chipset: Intel Xeon E3-1200 v3 DRAM, Memory: 16GB, Disk: 120GB Samsung SSD 850, Graphics: Sapphire AMD Radeon HD 4550, Audio: Realtek ALC887-VD, Network: Realtek RTL8111/8168/8411
OS: Debian 10, Kernel: 4.19.0-17-amd64 (x86_64), Display Server: X Server 1.20.4, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x12
Python Notes: Python 2.7.16 + Python 3.7.3
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 16 September 2021 18:03 by user phoronix.