2 x Intel Xeon E5420 testing with a Intel S5000PAL0 (S5000.86B.10.00.0091.081520081046 BIOS) and llvmpipe on Debian 10 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Disk Notes: MQ-DEADLINE / noatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x60c
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: 2 x Intel Xeon E5420 @ 2.50GHz (8 Cores), Motherboard: Intel S5000PAL0 (S5000.86B.10.00.0091.081520081046 BIOS), Chipset: Intel 5000P MCH, Memory: 8GB, Disk: 146GB SRCSASRB, Graphics: llvmpipe, Monitor: KIRA + VA903, Network: 2 x Intel 80003ES2LAN
OS: Debian 10, Kernel: 4.19.0-25-amd64 (x86_64), Desktop: Cinnamon 3.8.8, Display Server: X Server 1.20.4, OpenGL: 3.3 Mesa 18.3.6 (LLVM 7.0 128 bits), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 2560x1024
BlogBench is designed to replicate the load of a real-world busy file server by stressing the file-system with multiple threads of random reads, writes, and rewrites. The behavior is mimicked of that of a blog by creating blogs with content and pictures, modifying blog posts, adding comments to these blogs, and then reading the content of the blogs. All of these blogs generated are created locally with fake content and pictures. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Disk Notes: MQ-DEADLINE / noatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x60c
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 October 2023 04:33 by user igormisha.
Processor: 2 x Intel Xeon E5420 @ 2.50GHz (8 Cores), Motherboard: Intel S5000PAL0 (S5000.86B.10.00.0091.081520081046 BIOS), Chipset: Intel 5000P MCH, Memory: 8GB, Disk: 146GB SRCSASRB, Graphics: llvmpipe, Monitor: KIRA + VA903, Network: 2 x Intel 80003ES2LAN
OS: Debian 10, Kernel: 4.19.0-25-amd64 (x86_64), Desktop: Cinnamon 3.8.8, Display Server: X Server 1.20.4, OpenGL: 3.3 Mesa 18.3.6 (LLVM 7.0 128 bits), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 2560x1024
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Disk Notes: MQ-DEADLINE / noatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x60c
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 October 2023 05:42 by user igormisha.