BmtTest_blogbench
2 x Intel Xeon E5-2630 0 testing with a HP ProLiant DL380p Gen8 (P70 BIOS) and Matrox MGA G200EH on CentOS 7.8.2003 via the Phoronix Test Suite.
BmtTest_blogbench
Processor: 2 x Intel Xeon E5-2630 0 @ 2.30GHz (12 Cores / 24 Threads), Motherboard: HP ProLiant DL380p Gen8 (P70 BIOS), Chipset: Intel Xeon E5/Core, Memory: 8 x 8192 MB DDR3-1333MT/s 647650-071, Disk: 300GB LOGICAL VOLUME + 1200GB LOGICAL VOLUME, Graphics: Matrox MGA G200EH, Network: 4 x Broadcom NetXtreme BCM5719 PCIe
OS: CentOS 7.8.2003, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Disk Notes: DEADLINE / data=ordered,relatime,rw,stripe=64 / Block Size: 4096
Processor Notes: Scaling Governor: pcc-cpufreq conservative - CPU Microcode: 0x714
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + tsx_async_abort: Not affected
BlogBench
BlogBench is designed to replicate the load of a real-world busy file server by stressing the file-system with multiple threads of random reads, writes, and rewrites. The behavior is mimicked of that of a blog by creating blogs with content and pictures, modifying blog posts, adding comments to these blogs, and then reading the content of the blogs. All of these blogs generated are created locally with fake content and pictures. Learn more via the OpenBenchmarking.org test page.
BmtTest_blogbench
Processor: 2 x Intel Xeon E5-2630 0 @ 2.30GHz (12 Cores / 24 Threads), Motherboard: HP ProLiant DL380p Gen8 (P70 BIOS), Chipset: Intel Xeon E5/Core, Memory: 8 x 8192 MB DDR3-1333MT/s 647650-071, Disk: 300GB LOGICAL VOLUME + 1200GB LOGICAL VOLUME, Graphics: Matrox MGA G200EH, Network: 4 x Broadcom NetXtreme BCM5719 PCIe
OS: CentOS 7.8.2003, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Disk Notes: DEADLINE / data=ordered,relatime,rw,stripe=64 / Block Size: 4096
Processor Notes: Scaling Governor: pcc-cpufreq conservative - CPU Microcode: 0x714
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + tsx_async_abort: Not affected
Testing initiated at 19 November 2020 19:20 by user .