2022-12-22-0319

2 x < Sec-V Krnl Protect > testing with a Dell 06WXJT (2.13.3 BIOS) and Matrox G200eW3 on Ubuntu 20.04 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2212217-NE-20221222043&grw&sor.

2022-12-22-0319ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelDesktopDisplay ServerCompilerFile-SystemScreen Resolution2022-12-22 03:19mlc_run1_22-12_BMmlc_run1_22-12_CHESS_P2 x Intel Xeon Silver 4208 @ 3.20GHz (16 Cores / 32 Threads)Dell 06WXJT (2.13.3 BIOS)Intel Sky Lake-E DMI3 Registers64GB6000GB PERC H750 Adp + 299GB PERC H750 AdpMatrox G200eW34 x Broadcom NetXtreme BCM5720 2-port PCIeUbuntu 20.045.4.0-135-generic (x86_64)GNOME Shell 3.36.9X ServerGCC 9.4.0ext41024x7682 x < Sec-V Krnl Protect > @ 3.20GHz (16 Cores / 32 Threads)OpenBenchmarking.orgKernel Details- Transparent Huge Pages: madviseCompiler Details- 2022-12-22 03:19: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-Av3uEd/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v Processor Details- 2022-12-22 03:19: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x5003302- mlc_run1_22-12_BM: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x5003302- mlc_run1_22-12_CHESS_P: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x500320aSecurity Details- 2022-12-22 03:19: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled - mlc_run1_22-12_BM: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled - mlc_run1_22-12_CHESS_P: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled

2022-12-22-0319intel-mlc: Peak Injection Bandwidth - Stream-Triad Likeintel-mlc: Peak Injection Bandwidth - 2:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - 1:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - 3:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - All Readscpp-perf-bench: Atolcpp-perf-bench: Ctypecpp-perf-bench: Math Library2022-12-22 03:19mlc_run1_22-12_BMmlc_run1_22-12_CHESS_P83.92941.737412.81566653.963827.359121.565207.671171.0OpenBenchmarking.org

Intel Memory Latency Checker

Test: Peak Injection Bandwidth - Stream-Triad Like

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - Stream-Triad Likemlc_run1_22-12_BM14K28K42K56K70KSE +/- 94.73, N = 366653.9

Intel Memory Latency Checker

Test: Peak Injection Bandwidth - 2:1 Reads-Writes

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - 2:1 Reads-Writesmlc_run1_22-12_BM14K28K42K56K70KSE +/- 12.08, N = 363827.3

Intel Memory Latency Checker

Test: Peak Injection Bandwidth - 1:1 Reads-Writes

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - 1:1 Reads-Writesmlc_run1_22-12_BM13K26K39K52K65KSE +/- 179.35, N = 359121.5

Intel Memory Latency Checker

Test: Peak Injection Bandwidth - 3:1 Reads-Writes

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - 3:1 Reads-Writesmlc_run1_22-12_BM14K28K42K56K70KSE +/- 43.25, N = 365207.6

Intel Memory Latency Checker

Test: Peak Injection Bandwidth - All Reads

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - All Readsmlc_run1_22-12_BM15K30K45K60K75KSE +/- 8.74, N = 371171.0

CppPerformanceBenchmarks

Test: Atol

OpenBenchmarking.orgSeconds, Fewer Is BetterCppPerformanceBenchmarks 9Test: Atol2022-12-22 03:1920406080100SE +/- 0.05, N = 383.931. (CXX) g++ options: -std=c++11 -O3

CppPerformanceBenchmarks

Test: Ctype

OpenBenchmarking.orgSeconds, Fewer Is BetterCppPerformanceBenchmarks 9Test: Ctype2022-12-22 03:191020304050SE +/- 0.00, N = 341.741. (CXX) g++ options: -std=c++11 -O3

CppPerformanceBenchmarks

Test: Math Library

OpenBenchmarking.orgSeconds, Fewer Is BetterCppPerformanceBenchmarks 9Test: Math Library2022-12-22 03:1990180270360450SE +/- 1.33, N = 3412.821. (CXX) g++ options: -std=c++11 -O3


Phoronix Test Suite v10.8.4