2022-12-22-0319

2 x < Sec-V Krnl Protect > testing with a Dell 06WXJT (2.13.3 BIOS) and Matrox G200eW3 on Ubuntu 20.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2212217-NE-20221222043
Jump To Table - Results

View

Do Not Show Noisy Results
Do Not Show Results With Incomplete Data
Do Not Show Results With Little Change/Spread
List Notable Results
Show Result Confidence Charts
Allow Limiting Results To Certain Suite(s)

Statistics

Show Overall Harmonic Mean(s)
Show Overall Geometric Mean
Show Wins / Losses Counts (Pie Chart)
Normalize Results
Remove Outliers Before Calculating Averages

Graph Settings

Force Line Graphs Where Applicable
Convert To Scalar Where Applicable
Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Highlight
Result
Toggle/Hide
Result
Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
2022-12-22 03:19
December 22 2022
  27 Minutes
mlc_run1_22-12_BM
December 22 2022
  7 Minutes
mlc_run1_22-12_CHESS_P
December 22 2022
  1 Minute
Invert Behavior (Only Show Selected Data)
  12 Minutes

Only show results where is faster than
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


2022-12-22-0319OpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon Silver 4208 @ 3.20GHz (16 Cores / 32 Threads)2 x < Sec-V Krnl Protect > @ 3.20GHz (16 Cores / 32 Threads)Dell 06WXJT (2.13.3 BIOS)Intel Sky Lake-E DMI3 Registers64GB6000GB PERC H750 Adp + 299GB PERC H750 AdpMatrox G200eW34 x Broadcom NetXtreme BCM5720 2-port PCIeUbuntu 20.045.4.0-135-generic (x86_64)GNOME Shell 3.36.9X ServerGCC 9.4.0ext41024x768ProcessorsMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelDesktopDisplay ServerCompilerFile-SystemScreen Resolution2022-12-22-0319 BenchmarksSystem Logs- Transparent Huge Pages: madvise- 2022-12-22 03:19: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-Av3uEd/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v - 2022-12-22 03:19: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x5003302 - mlc_run1_22-12_BM: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x5003302 - mlc_run1_22-12_CHESS_P: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x500320a - 2022-12-22 03:19: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled - mlc_run1_22-12_BM: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled - mlc_run1_22-12_CHESS_P: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled

2022-12-22-0319intel-mlc: Peak Injection Bandwidth - Stream-Triad Likeintel-mlc: Peak Injection Bandwidth - 2:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - 1:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - 3:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - All Readscpp-perf-bench: Atolcpp-perf-bench: Ctypecpp-perf-bench: Math Library2022-12-22 03:19mlc_run1_22-12_BMmlc_run1_22-12_CHESS_P83.92941.737412.81566653.963827.359121.565207.671171.0OpenBenchmarking.org

Intel Memory Latency Checker

Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. If the download fails you may need to manually download the file from https://www.intel.com/content/www/us/en/developer/articles/tool/intelr-memory-latency-checker.html and place it in your PTS download cache. On some systems root privileges are needed to run the MLC tester. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - Stream-Triad Likemlc_run1_22-12_BM14K28K42K56K70KSE +/- 94.73, N = 366653.9

Test: Peak Injection Bandwidth

mlc_run1_22-12_CHESS_P: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result.

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - 2:1 Reads-Writesmlc_run1_22-12_BM14K28K42K56K70KSE +/- 12.08, N = 363827.3

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - 1:1 Reads-Writesmlc_run1_22-12_BM13K26K39K52K65KSE +/- 179.35, N = 359121.5

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - 3:1 Reads-Writesmlc_run1_22-12_BM14K28K42K56K70KSE +/- 43.25, N = 365207.6

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - All Readsmlc_run1_22-12_BM15K30K45K60K75KSE +/- 8.74, N = 371171.0

CppPerformanceBenchmarks

CppPerformanceBenchmarks is a set of C++ compiler performance benchmarks. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSeconds, Fewer Is BetterCppPerformanceBenchmarks 9Test: Atol2022-12-22 03:1920406080100SE +/- 0.05, N = 383.931. (CXX) g++ options: -std=c++11 -O3

OpenBenchmarking.orgSeconds, Fewer Is BetterCppPerformanceBenchmarks 9Test: Ctype2022-12-22 03:191020304050SE +/- 0.00, N = 341.741. (CXX) g++ options: -std=c++11 -O3

OpenBenchmarking.orgSeconds, Fewer Is BetterCppPerformanceBenchmarks 9Test: Math Library2022-12-22 03:1990180270360450SE +/- 1.33, N = 3412.821. (CXX) g++ options: -std=c++11 -O3