compilebenchtest
KVM testing on CentOS 7.4.1708 via the Phoronix Test Suite.
compilebenchtest
Processor: Intel Xeon Gold 6278C (1 Core / 2 Threads), Motherboard: OpenStack Foundation Nova (rel-1.10.2-0-g5f4c7b1-20181220_000000-szxrtosci10000 BIOS), Memory: 1 x 4096 MB RAM QEMU, Disk: 40GB, Graphics: cirrusdrmfb
OS: CentOS 7.4.1708, Kernel: 3.10.0-1062.12.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Disk Notes: MQ-DEADLINE / data=ordered,relatime,rw
Processor Notes: CPU Microcode: 0x1
Python Notes: Python 2.7.5
Security Notes: itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Compile Bench
Compilebench tries to age a filesystem by simulating some of the disk IO common in creating, compiling, patching, stating and reading kernel trees. It indirectly measures how well filesystems can maintain directory locality as the disk fills up and directories age. This current test is setup to use the makej mode with 10 initial directories Learn more via the OpenBenchmarking.org test page.
compilebenchtest
Processor: Intel Xeon Gold 6278C (1 Core / 2 Threads), Motherboard: OpenStack Foundation Nova (rel-1.10.2-0-g5f4c7b1-20181220_000000-szxrtosci10000 BIOS), Memory: 1 x 4096 MB RAM QEMU, Disk: 40GB, Graphics: cirrusdrmfb
OS: CentOS 7.4.1708, Kernel: 3.10.0-1062.12.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Disk Notes: MQ-DEADLINE / data=ordered,relatime,rw
Processor Notes: CPU Microcode: 0x1
Python Notes: Python 2.7.5
Security Notes: itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 10 August 2020 20:20 by user .