test36
KVM QEMU 4.2.0 testing on Ubuntu 20.04 via the Phoronix Test Suite.
tw_test36
Kernel Notes: Transparent Huge Pages: never
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-Av3uEd/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Ubuntu 20.04
Processor: QEMU Virtual 4.2.0 (1 Core), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (1.13.0-1ubuntu1.1 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 512 MB RAM QEMU, Disk: 10GB, Graphics: bochs-drmdrmfb, Network: Red Hat Virtio device
OS: Ubuntu 20.04, Kernel: 5.4.0-109-generic (x86_64), Vulkan: 1.1.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM QEMU 4.2.0
Sockperf
This is a network socket API performance benchmark developed by Mellanox. This test profile runs both the client and server on the local host for evaluating individual system performance. Learn more via the OpenBenchmarking.org test page.
Test: Latency Under Load
tw_test36: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ./sockperf: 7: ./sockperf: not found
Ubuntu 20.04: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ./sockperf: 7: ./sockperf: not found
Test: Latency Ping Pong
tw_test36: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ./sockperf: 7: ./sockperf: not found
Ubuntu 20.04: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ./sockperf: 7: ./sockperf: not found
Test: Throughput
tw_test36: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ./sockperf: 7: ./sockperf: not found
Ubuntu 20.04: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ./sockperf: 7: ./sockperf: not found
CPU Frequency (CPU0) Monitor
CPU Usage (CPU0) Monitor
CPU Usage (Summary) Monitor
GPU Fan Speed Monitor
Drive Read Speed (vda) Monitor
Drive Read Speed (vdb) Monitor
Drive Write Speed (vda) Monitor
Drive Write Speed (vdb) Monitor
Memory Usage Monitor
System Iowait Monitor
tw_test36
Kernel Notes: Transparent Huge Pages: never
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-Av3uEd/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 2 May 2022 15:25 by user root.
Ubuntu 20.04
Processor: QEMU Virtual 4.2.0 (1 Core), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (1.13.0-1ubuntu1.1 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 512 MB RAM QEMU, Disk: 10GB, Graphics: bochs-drmdrmfb, Network: Red Hat Virtio device
OS: Ubuntu 20.04, Kernel: 5.4.0-109-generic (x86_64), Vulkan: 1.1.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM QEMU 4.2.0
Kernel Notes: Transparent Huge Pages: never
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-Av3uEd/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 2 May 2022 15:32 by user root.