KVM testing on Ubuntu 22.04 via the Phoronix Test Suite.
Processor: 4 x Intel Xeon (Skylake IBRS) (4 Cores), Motherboard: OpenStack Foundation Nova v27.1.1 (1.16.1-1.el9 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 49GB, Graphics: Red Hat Virtio GPU, Network: Red Hat Virtio device
OS: Ubuntu 22.04, Kernel: 5.15.0-91-generic (x86_64), Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Ethr is a cross-platform Golang-written network performance measurement tool developed by Microsoft that is capable of testing multiple protocols and conducting different measurements. Learn more via the OpenBenchmarking.org test page.
Server Address: 45.131.182.88 - Protocol: UDP - Test: Latency - Threads: 8
Red Hat Virtio device: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Test: "Latency" for Protocol: "UDP" is not supported.
Server Address: 45.131.182.88 - Protocol: HTTP - Test: Latency - Threads: 8
Red Hat Virtio device: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Invalid value "http" specified for parameter "-p".
Server Address: 45.131.182.88 - Protocol: HTTP - Test: Bandwidth - Threads: 8
Red Hat Virtio device: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Invalid value "http" specified for parameter "-p".
Server Address: 45.131.182.88 - Protocol: UDP - Test: Connections/s - Threads: 8
Red Hat Virtio device: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Test: "Connections/s" for Protocol: "UDP" is not supported.
Server Address: 45.131.182.88 - Protocol: HTTP - Test: Connections/s - Threads: 8
Red Hat Virtio device: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Invalid value "http" specified for parameter "-p".
Processor: 4 x Intel Xeon (Skylake IBRS) (4 Cores), Motherboard: OpenStack Foundation Nova v27.1.1 (1.16.1-1.el9 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 49GB, Graphics: Red Hat Virtio GPU, Network: Red Hat Virtio device
OS: Ubuntu 22.04, Kernel: 5.15.0-91-generic (x86_64), Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 9 December 2023 15:51 by user zer.