vm-edelia-centos-part2
KVM testing on CentOS Linux 7 via the Phoronix Test Suite.
VM EF
Processor: 4 x Intel Xeon Gold 6140 (8 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 16384 MB DRAM, Disk: 16GB Virtual disk + 54GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Red Hat Enterprise Linux Server 7.5, Kernel: 3.10.0-862.11.6.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1672x1254, System Layer: VMware
Disk Notes: DEADLINE / data=ordered,relatime,rw
Processor Notes: CPU Microcode: 0x2000043
Python Notes: Python 2.7.5
Security Notes: l1tf: Mitigation of PTE Inversion + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel)
vm aws
Processor: Intel Xeon Platinum 8175M (2 Cores / 4 Threads), Motherboard: Amazon EC2 m5.xlarge (1.0 BIOS), Memory: 16GB, Disk: 9GB Amazon Elastic Block Store + 107GB Amazon Elastic Block Store
OS: CentOS Linux 7, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, System Layer: KVM
Disk Notes: NONE / attr2,inode64,noquota,relatime,rw,seclabel
Processor Notes: CPU Microcode: 0x2000069
Python Notes: Python 2.7.5
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Compile Bench
Compilebench tries to age a filesystem by simulating some of the disk IO common in creating, compiling, patching, stating and reading kernel trees. It indirectly measures how well filesystems can maintain directory locality as the disk fills up and directories age. This current test is setup to use the makej mode with 10 initial directories Learn more via the OpenBenchmarking.org test page.
System XZ Decompression
This test measures the time to decompress a Linux kernel tarball using XZ. Learn more via the OpenBenchmarking.org test page.
GnuPG
This test times how long it takes to encrypt a file using GnuPG. Learn more via the OpenBenchmarking.org test page.
Gzip Compression
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
Compile Bench
Compilebench tries to age a filesystem by simulating some of the disk IO common in creating, compiling, patching, stating and reading kernel trees. It indirectly measures how well filesystems can maintain directory locality as the disk fills up and directories age. This current test is setup to use the makej mode with 10 initial directories Learn more via the OpenBenchmarking.org test page.
Apache Benchmark
This is a test of ab, which is the Apache benchmark program. This test profile measures how many requests per second a given system can sustain when carrying out 1,000,000 requests with 100 requests being carried out concurrently. Learn more via the OpenBenchmarking.org test page.
NGINX Benchmark
This is a test of ab, which is the Apache Benchmark program running against nginx. This test profile measures how many requests per second a given system can sustain when carrying out 2,000,000 requests with 500 requests being carried out concurrently. Learn more via the OpenBenchmarking.org test page.
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
VM EF
Processor: 4 x Intel Xeon Gold 6140 (8 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 16384 MB DRAM, Disk: 16GB Virtual disk + 54GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Red Hat Enterprise Linux Server 7.5, Kernel: 3.10.0-862.11.6.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1672x1254, System Layer: VMware
Disk Notes: DEADLINE / data=ordered,relatime,rw
Processor Notes: CPU Microcode: 0x2000043
Python Notes: Python 2.7.5
Security Notes: l1tf: Mitigation of PTE Inversion + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel)
Testing initiated at 19 June 2020 09:22 by user root.
vm aws
Processor: Intel Xeon Platinum 8175M (2 Cores / 4 Threads), Motherboard: Amazon EC2 m5.xlarge (1.0 BIOS), Memory: 16GB, Disk: 9GB Amazon Elastic Block Store + 107GB Amazon Elastic Block Store
OS: CentOS Linux 7, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, System Layer: KVM
Disk Notes: NONE / attr2,inode64,noquota,relatime,rw,seclabel
Processor Notes: CPU Microcode: 0x2000069
Python Notes: Python 2.7.5
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 19 June 2020 11:22 by user .