KVM testing on Oracle Linux Server 9.4 via the Phoronix Test Suite.
Processor: AMD EPYC 9J14 96-Core (2 Cores / 4 Threads), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (1.6.4 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 2 x 16 GB RAM QEMU, Disk: 50GB BlockVolume, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio 1.0 device
OS: Oracle Linux Server 9.4, Kernel: 5.14.0-427.28.1.el9_4.x86_64 (x86_64), Compiler: GCC 11.5.0 20240719, File-System: xfs, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: nvme_core.shutdown_timeout=10 libiscsi.debug_libiscsi_eh=1 - Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-host-bind-now --enable-host-pie --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-link-serialization=1 --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-arch_64=x86-64-v2 --with-build-config=bootstrap-lto --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver --without-isl
Processor Notes: CPU Microcode: 0xa101148
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This is a network socket API performance benchmark developed by Mellanox. This test profile runs both the client and server on the local host for evaluating individual system performance. Learn more via the OpenBenchmarking.org test page.
Processor: AMD EPYC 9J14 96-Core (2 Cores / 4 Threads), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (1.6.4 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 2 x 16 GB RAM QEMU, Disk: 50GB BlockVolume, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio 1.0 device
OS: Oracle Linux Server 9.4, Kernel: 5.14.0-427.28.1.el9_4.x86_64 (x86_64), Compiler: GCC 11.5.0 20240719, File-System: xfs, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: nvme_core.shutdown_timeout=10 libiscsi.debug_libiscsi_eh=1 - Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-host-bind-now --enable-host-pie --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-link-serialization=1 --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-arch_64=x86-64-v2 --with-build-config=bootstrap-lto --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver --without-isl
Processor Notes: CPU Microcode: 0xa101148
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 26 November 2024 02:07 by user root.