Blogbench-MVCentos
Blogbench-MVCentos
Blogbench-MVCentos
Processor: Intel Core i3-5005U (1 Core), Motherboard: Oracle VirtualBox v1.2, Memory: 4096MB, Disk: 9GB VBOX HDD, Graphics: svgadrmfb
OS: CentOS Linux 7, Kernel: 3.10.0-1127.19.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 2048x2048, System Layer: KVM VirtualBox
Disk Notes: DEADLINE / attr2,inode64,noquota,relatime,rw,seclabel
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
BlogBench
BlogBench is designed to replicate the load of a real-world busy file server by stressing the file-system with multiple threads of random reads, writes, and rewrites. The behavior is mimicked of that of a blog by creating blogs with content and pictures, modifying blog posts, adding comments to these blogs, and then reading the content of the blogs. All of these blogs generated are created locally with fake content and pictures. Learn more via the OpenBenchmarking.org test page.
Blogbench-MVCentos
Processor: Intel Core i3-5005U (1 Core), Motherboard: Oracle VirtualBox v1.2, Memory: 4096MB, Disk: 9GB VBOX HDD, Graphics: svgadrmfb
OS: CentOS Linux 7, Kernel: 3.10.0-1127.19.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 2048x2048, System Layer: KVM VirtualBox
Disk Notes: DEADLINE / attr2,inode64,noquota,relatime,rw,seclabel
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 4 December 2020 13:30 by user root.