blogbench-1
2 x Intel Xeon Silver 4110 testing with a Supermicro X11DAi-N v1.02 (3.2 BIOS) and eVGA NVIDIA GeForce GTX 1080 Ti 11GB on Arch Linux via the Phoronix Test Suite.
koshast-blogbench-1
Processor: 2 x Intel Xeon Silver 4110 @ 3.00GHz (16 Cores / 32 Threads), Motherboard: Supermicro X11DAi-N v1.02 (3.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 8 x 16384 MB DDR4-2666MT/s, Disk: 2 x 1000GB Samsung SSD 970 EVO Plus 1TB + 256GB Samsung SSD 850, Graphics: eVGA NVIDIA GeForce GTX 1080 Ti 11GB, Audio: Realtek ALC888-VD, Network: 2 x Intel X722 for 1GbE
OS: Arch Linux, Kernel: 5.7.12-arch1-1 (x86_64), Desktop: KDE Frameworks 5.72.0, Display Server: X Server 1.20.8, Compiler: GCC 10.1.0 + Clang 10.0.1 + LLVM 10.0.1 + CUDA 11.0, File-System: xfs, Screen Resolution: 1024x768
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: NONE / attr2,inode64,logbsize=32k,logbufs=8,noquota,relatime,rw / raid1 nvme0n1p3[0] nvme1n1p3[1]
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2000065
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
BlogBench
BlogBench is designed to replicate the load of a real-world busy file server by stressing the file-system with multiple threads of random reads, writes, and rewrites. The behavior is mimicked of that of a blog by creating blogs with content and pictures, modifying blog posts, adding comments to these blogs, and then reading the content of the blogs. All of these blogs generated are created locally with fake content and pictures. Learn more via the OpenBenchmarking.org test page.
koshast-blogbench-1
Processor: 2 x Intel Xeon Silver 4110 @ 3.00GHz (16 Cores / 32 Threads), Motherboard: Supermicro X11DAi-N v1.02 (3.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 8 x 16384 MB DDR4-2666MT/s, Disk: 2 x 1000GB Samsung SSD 970 EVO Plus 1TB + 256GB Samsung SSD 850, Graphics: eVGA NVIDIA GeForce GTX 1080 Ti 11GB, Audio: Realtek ALC888-VD, Network: 2 x Intel X722 for 1GbE
OS: Arch Linux, Kernel: 5.7.12-arch1-1 (x86_64), Desktop: KDE Frameworks 5.72.0, Display Server: X Server 1.20.8, Compiler: GCC 10.1.0 + Clang 10.0.1 + LLVM 10.0.1 + CUDA 11.0, File-System: xfs, Screen Resolution: 1024x768
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: NONE / attr2,inode64,logbsize=32k,logbufs=8,noquota,relatime,rw / raid1 nvme0n1p3[0] nvme1n1p3[1]
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2000065
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 9 August 2020 07:44 by user root.