bftpvc00t-bftnpm00t-20220930-1715 KVM testing on Ubuntu 20.04 via the Phoronix Test Suite.
Compare your own system(s) to this result file with the
Phoronix Test Suite by running the command:
phoronix-test-suite benchmark 2210026-NE-BFTPVC00T08 tiobrench-1.3.1 5-5-5 Processor: Intel Xeon E3-12xx v2 (8 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 16GB, Disk: 537GB QEMU HDD, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 20.04, Kernel: 5.4.0-126-generic (x86_64), Vulkan: 1.1.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madviseCompiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-Av3uEd/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -vDisk Notes: MQ-DEADLINE / relatime,rw / Block Size: 4096Processor Notes: CPU Microcode: 0x1Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
bftpvc00t-bftnpm00t-20220930-1715 OpenBenchmarking.org Phoronix Test Suite Intel Xeon E3-12xx v2 (8 Cores) QEMU Standard PC (i440FX + PIIX 1996) (rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org BIOS) Intel 440FX 82441FX PMC 16GB 537GB QEMU HDD bochs-drmdrmfb QEMU Monitor Red Hat Virtio device Ubuntu 20.04 5.4.0-126-generic (x86_64) 1.1.182 GCC 9.4.0 ext4 1024x768 KVM Processor Motherboard Chipset Memory Disk Graphics Monitor Network OS Kernel Vulkan Compiler File-System Screen Resolution System Layer Bftpvc00t-bftnpm00t-20220930-1715 Benchmarks System Logs - Transparent Huge Pages: madvise - --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-Av3uEd/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v - MQ-DEADLINE / relatime,rw / Block Size: 4096 - CPU Microcode: 0x1 - itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
bftpvc00t-bftnpm00t-20220930-1715 tiobench: Read - 32MB - 4 tiobench: Read - 32MB - 8 tiobench: Read - 64MB - 4 tiobench: Read - 64MB - 8 tiobench: Read - 128MB - 4 tiobench: Read - 128MB - 8 tiobench: Read - 256MB - 4 tiobench: Read - 256MB - 8 tiobench: Read - 32MB - 16 tiobench: Read - 32MB - 32 tiobench: Read - 64MB - 16 tiobench: Read - 64MB - 32 tiobench: Write - 32MB - 4 tiobench: Write - 32MB - 8 tiobench: Write - 64MB - 4 tiobench: Write - 64MB - 8 tiobench: Read - 128MB - 16 tiobench: Read - 128MB - 32 tiobench: Read - 256MB - 16 tiobench: Read - 256MB - 32 tiobench: Write - 128MB - 4 tiobench: Write - 128MB - 8 tiobench: Write - 256MB - 4 tiobench: Write - 256MB - 8 tiobench: Write - 32MB - 16 tiobench: Write - 32MB - 32 tiobench: Write - 64MB - 16 tiobench: Write - 64MB - 32 tiobench: Write - 128MB - 16 tiobench: Write - 128MB - 32 tiobench: Write - 256MB - 16 tiobench: Write - 256MB - 32 tiobench: Rand Read - 32MB - 4 tiobench: Rand Read - 32MB - 8 tiobench: Rand Read - 64MB - 4 tiobench: Rand Read - 64MB - 8 tiobench: Rand Read - 128MB - 4 tiobench: Rand Read - 128MB - 8 tiobench: Rand Read - 256MB - 4 tiobench: Rand Read - 256MB - 8 tiobench: Rand Read - 32MB - 16 tiobench: Rand Read - 32MB - 32 tiobench: Rand Read - 64MB - 16 tiobench: Rand Read - 64MB - 32 tiobench: Rand Write - 32MB - 4 tiobench: Rand Write - 32MB - 8 tiobench: Rand Write - 64MB - 4 tiobench: Rand Write - 64MB - 8 tiobench: Rand Read - 128MB - 16 tiobench: Rand Read - 128MB - 32 tiobench: Rand Read - 256MB - 16 tiobench: Rand Read - 256MB - 32 tiobench: Rand Write - 128MB - 4 tiobench: Rand Write - 128MB - 8 tiobench: Rand Write - 256MB - 4 tiobench: Rand Write - 256MB - 8 tiobench: Rand Write - 32MB - 16 tiobench: Rand Write - 32MB - 32 tiobench: Rand Write - 64MB - 16 tiobench: Rand Write - 64MB - 32 tiobench: Rand Write - 128MB - 16 tiobench: Rand Write - 128MB - 32 tiobench: Rand Write - 256MB - 16 tiobench: Rand Write - 256MB - 32 tiobrench-1.3.1 5-5-5 5234.726 8268.305 6483.683 10408.814 7241.858 10364.920 8115.376 11446.933 11016.954 12661.946 12282.212 14822.335 1.955 3.631 1.965 3.507 13157.456 14994.051 14332.133 15570.223 1.943 3.469 1.934 3.468 6.150 9.340 6.058 9.197 6.054 9.113 5.923 8.892 12013.867 18143.817 23442.215 35843.094 42657.331 69551.926 86044.818 123494.007 27980.237 32805.492 60566.081 78968.009 16.048 31.468 31.387 61.652 115237.947 166036.069 220860.887 300717.158 64.566 123.118 130.697 251.637 50.746 75.807 100.468 147.228 199.866 300.984 402.069 592.748 OpenBenchmarking.org
tiobrench-1.3.1 5-5-5 Processor: Intel Xeon E3-12xx v2 (8 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 16GB, Disk: 537GB QEMU HDD, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 20.04, Kernel: 5.4.0-126-generic (x86_64), Vulkan: 1.1.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madviseCompiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-Av3uEd/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -vDisk Notes: MQ-DEADLINE / relatime,rw / Block Size: 4096Processor Notes: CPU Microcode: 0x1Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 30 September 2022 21:16 by user adm_jcook.