FreeBSD 12.2 ZFS clang 10.0.1
Disk Notes: NONE / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Disk Notes: KYBER / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-gentoo-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Disk Notes: MQ-DEADLINE / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Disk Notes: NONE / discard,errors=remount-ro,noatime,rw
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3615QM @ 2.30GHz (8 Cores), Motherboard: Apple MacBookPro10 1 1.0, Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 218GB, Graphics: Unknown 981MB, Audio: NVIDIA (0x0e1b) HDA
OS: FreeBSD, Kernel: 12.1-RELEASE (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: Clang 8.0.1 (SVN 366581), File-System: zfs, Screen Resolution: 2880x1800
Environment Notes: LIBGL_ALWAYS_SOFTWARE=1
Security Notes: KPTI
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: Intel HD 4000, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: VoidLinux rolling, Kernel: 5.8.9_1 (x86_64), Display Server: X Server 1.20.9, Display Driver: intel 2.99.917, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 2880x1800
Kernel Notes: i915.enable_rc6=7 i915.enable_fbc=1 i915.fastboot=1
Compiler Notes: --build=x86_64-linux-musl --disable-libsanitizer --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-symvers --disable-target-libiberty --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-fast-character --enable-languages=c,c++,objc,obj-c++,fortran,lto,go,ada --enable-lto --enable-plugins --enable-serial-configure --enable-shared --enable-threads=posix --enable-vtable-verify --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: MQ-DEADLINE / relatime,rw
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom NetXtreme BCM57762 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: OpenMandrivaLinux 4.1, Kernel: 5.5.12-desktop-1omv4001 (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.3 Mesa 20.0.7, Compiler: Clang 9.0.1 + GCC 9.2.1 20191207 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 2880x1800
Kernel Notes: dm_mod.use_blk_mq=1
Environment Notes: AMD_DEBUG=nodcc
Disk Notes: MQ-DEADLINE / discard,noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected
Disk Notes: BFQ / relatime,rw,seclabel,space_cache,ssd,subvol=/home,subvolid=257
Processor Notes: Scaling Governor: intel_cpufreq performance
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8192MB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom NetXtreme BCM57762 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Fedora 33, Kernel: 5.8.9-301.fc33.x86_64 (x86_64), Desktop: MATE 1.24.1, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc4, Compiler: GCC 10.2.1 20200826 + Clang 11.0.0 + LLVM 11.0.0, File-System: btrfs, Screen Resolution: 2880x1800
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA GeForce GT 650M 1GB (797/2508MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Ubuntu 20.04, Kernel: 5.4.0-47-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: NVIDIA 390.138, OpenGL: 4.6.0, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 2880x1800
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x21
Disk Scheduler Notes: NONE
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (262.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA GeForce GT 650M 1GB (797/2508MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom NetXtreme BCM57762 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Clear Linux OS 33720, Kernel: 5.8.9-986.native (x86_64), Desktop: GNOME Shell 3.36.5, Display Server: X Server 1.20.8, Display Driver: NVIDIA 455.23.04, OpenGL: 4.6.0, OpenCL: OpenCL 1.2 CUDA 11.1.70, Vulkan: 1.2.145, Compiler: GCC 10.2.1 20200915 releases/gcc-10.2.0-253-g49b3d88e9d + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: FFLAGS="-g -O3 -feliminate-unused-debug-types -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=32 -m64 -fasynchronous-unwind-tables -Wp,-D_REENTRANT -ftree-loop-distribute-patterns -Wl,-z -Wl,now -Wl,-z -Wl,relro -malign-data=abi -fno-semantic-interposition -ftree-vectorize -ftree-loop-vectorize -Wl,--enable-new-dtags -Wa,-mbranches-within-32B-boundaries" CXXFLAGS="-g -O3 -feliminate-unused-debug-types -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=32 -Wformat -Wformat-security -m64 -fasynchronous-unwind-tables -Wp,-D_REENTRANT -ftree-loop-distribute-patterns -Wl,-z -Wl,now -Wl,-z -Wl,relro -fno-semantic-interposition -ffat-lto-objects -fno-trapping-math -Wl,-sort-common -Wl,--enable-new-dtags -mtune=skylake -Wa,-mbranches-within-32B-boundaries -fvisibility-inlines-hidden -Wl,--enable-new-dtags" FCFLAGS="-g -O3 -feliminate-unused-debug-types -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=32 -m64 -fasynchronous-unwind-tables -Wp,-D_REENTRANT -ftree-loop-distribute-patterns -Wl,-z -Wl,now -Wl,-z -Wl,relro -malign-data=abi -fno-semantic-interposition -ftree-vectorize -ftree-loop-vectorize -Wl,-sort-common -Wl,--enable-new-dtags" CFLAGS="-g -O3 -feliminate-unused-debug-types -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=32 -Wformat -Wformat-security -m64 -fasynchronous-unwind-tables -Wp,-D_REENTRANT -ftree-loop-distribute-patterns -Wl,-z -Wl,now -Wl,-z -Wl,relro -fno-semantic-interposition -ffat-lto-objects -fno-trapping-math -Wl,-sort-common -Wl,--enable-new-dtags -mtune=skylake -Wa,-mbranches-within-32B-boundaries" THEANO_FLAGS="floatX=float32,openmp=true,gcc.cxxflags="-ftree-vectorize -mavx""
Compiler Notes: --build=x86_64-generic-linux --disable-libmpx --disable-libunwind-exceptions --disable-multiarch --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-clocale=gnu --enable-default-pie --enable-gnu-indirect-function --enable-languages=c,c++,fortran,go --enable-ld=default --enable-libstdcxx-pch --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --exec-prefix=/usr --includedir=/usr/include --target=x86_64-generic-linux --with-arch=westmere --with-gcc-major-version-only --with-glibc-version=2.19 --with-gnu-ld --with-isl --with-ppl=yes --with-tune=haswell
Disk Notes: BFQ / relatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (262.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: Intel 3rd Gen Core, Audio: Intel 7 /C216, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo/Linux, Kernel: 5.8.11-gentoo-x86_64 (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: GCC 9.3.0 + Clang 10.0.1, File-System: f2fs, Screen Resolution: 2880x1800
Compiler Notes: --bindir=/usr/x86_64-gentoo-linux-musl/gcc-bin/9.3.0 --build=x86_64-gentoo-linux-musl --datadir=/usr/share/gcc-data/x86_64-gentoo-linux-musl/9.3.0 --disable-esp --disable-fixed-point --disable-libada --disable-libsanitizer --disable-libssp --disable-libvtv --disable-multilib --disable-nls --disable-systemtap --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --host=x86_64-gentoo-linux-musl --includedir=/usr/lib/gcc/x86_64-gentoo-linux-musl/9.3.0/include --mandir=/usr/share/gcc-data/x86_64-gentoo-linux-musl/9.3.0/man --with-multilib-list=m64 --with-python-dir=/share/gcc-data/x86_64-gentoo-linux-musl/9.3.0/python --without-isl
Disk Notes: MQ-DEADLINE / acl,active_logs=6,alloc_mode=default,background_gc=on,discard,extent_cache,flush_merge,fsync_mode=posix,inline_data,inline_dentry,inline_xattr,lazytime,mode=adaptive,no_heap,noatime,rw,user_xattr
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (262.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: Intel NVIDIA NVE7 1GB (1200MHz), Audio: Intel 7 /C216, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo/Linux, Kernel: 5.9.11-gentoo-x86_64clang (x86_64), Desktop: LXQt 0.16.0, Display Server: X Server 1.20.8, Display Driver: nouveau 1.0.16, Compiler: GCC 10.2.0 + Clang 11.0.0Target: + LLVM 11.0.0, File-System: f2fs, Screen Resolution: 2880x1800
Disk Notes: MQ-DEADLINE / acl,active_logs=6,alloc_mode=default,background_gc=on,discard,extent_cache,flush_merge,fsync_mode=posix,inline_data,inline_dentry,inline_xattr,lazytime,mode=adaptive,no_heap,relatime,rw,user_xattr / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Disk Notes: MQ-DEADLINE / discard,noatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (262.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Calculate/Linux, Kernel: 5.4.57-calculate (x86_64), Desktop: MATE 1.24.1, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.1.10, Compiler: GCC 9.3.0 + Clang 11.0.0Target: + LLVM 11.0.0, File-System: ext4, Screen Resolution: 2880x1800
Disk Notes: MQ-DEADLINE / discard,noatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3615QM @ 2.30GHz (8 Cores), Motherboard: Apple MacBookPro10 1 1.0, Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 215GB, Graphics: NVIDIA GeForce GT 650M 981MB, Audio: NVIDIA (0x0e1b) HDA, Monitor: Color LCD
OS: FreeBSD, Kernel: 12.2-RELEASE-p1 (x86_64), Desktop: Xfce 4.14, Display Server: X Server 1.20.9, Display Driver: NVIDIA 1.0.0, Compiler: Clang 10.0.1, File-System: zfs, Screen Resolution: 2880x1800
Security Notes: KPTI
Fio is an advanced disk benchmark that depends upon the kernel's AIO access library. Learn more via the OpenBenchmarking.org test page.
FS_Mark is designed to test a system's file-system performance. Learn more via the OpenBenchmarking.org test page.
Disk Notes: NONE / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 18 August 2020 10:52 by user tux.
Disk Notes: KYBER / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 18 August 2020 12:02 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-gentoo-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Disk Notes: MQ-DEADLINE / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 18 August 2020 13:03 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Disk Notes: NONE / discard,errors=remount-ro,noatime,rw
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 18 August 2020 13:54 by user tux.
Processor: Intel Core i7-3615QM @ 2.30GHz (8 Cores), Motherboard: Apple MacBookPro10 1 1.0, Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 218GB, Graphics: Unknown 981MB, Audio: NVIDIA (0x0e1b) HDA
OS: FreeBSD, Kernel: 12.1-RELEASE (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: Clang 8.0.1 (SVN 366581), File-System: zfs, Screen Resolution: 2880x1800
Environment Notes: LIBGL_ALWAYS_SOFTWARE=1
Security Notes: KPTI
Testing initiated at 11 September 2020 10:26 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: Intel HD 4000, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: VoidLinux rolling, Kernel: 5.8.9_1 (x86_64), Display Server: X Server 1.20.9, Display Driver: intel 2.99.917, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 2880x1800
Kernel Notes: i915.enable_rc6=7 i915.enable_fbc=1 i915.fastboot=1
Compiler Notes: --build=x86_64-linux-musl --disable-libsanitizer --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-symvers --disable-target-libiberty --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-fast-character --enable-languages=c,c++,objc,obj-c++,fortran,lto,go,ada --enable-lto --enable-plugins --enable-serial-configure --enable-shared --enable-threads=posix --enable-vtable-verify --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: MQ-DEADLINE / relatime,rw
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 16 September 2020 21:44 by user .
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom NetXtreme BCM57762 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: OpenMandrivaLinux 4.1, Kernel: 5.5.12-desktop-1omv4001 (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.3 Mesa 20.0.7, Compiler: Clang 9.0.1 + GCC 9.2.1 20191207 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 2880x1800
Kernel Notes: dm_mod.use_blk_mq=1
Environment Notes: AMD_DEBUG=nodcc
Disk Notes: MQ-DEADLINE / discard,noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected
Testing initiated at 17 September 2020 16:49 by user tux.
Disk Notes: BFQ / relatime,rw,seclabel,space_cache,ssd,subvol=/home,subvolid=257
Processor Notes: Scaling Governor: intel_cpufreq performance
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 18 September 2020 19:41 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8192MB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom NetXtreme BCM57762 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Fedora 33, Kernel: 5.8.9-301.fc33.x86_64 (x86_64), Desktop: MATE 1.24.1, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc4, Compiler: GCC 10.2.1 20200826 + Clang 11.0.0 + LLVM 11.0.0, File-System: btrfs, Screen Resolution: 2880x1800
Disk Notes: BFQ / relatime,rw,seclabel,space_cache,ssd,subvol=/home,subvolid=257
Processor Notes: Scaling Governor: intel_cpufreq performance
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 18 September 2020 20:14 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA GeForce GT 650M 1GB (797/2508MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Ubuntu 20.04, Kernel: 5.4.0-47-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: NVIDIA 390.138, OpenGL: 4.6.0, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 2880x1800
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x21
Disk Scheduler Notes: NONE
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 19 September 2020 17:16 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (262.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA GeForce GT 650M 1GB (797/2508MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom NetXtreme BCM57762 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Clear Linux OS 33720, Kernel: 5.8.9-986.native (x86_64), Desktop: GNOME Shell 3.36.5, Display Server: X Server 1.20.8, Display Driver: NVIDIA 455.23.04, OpenGL: 4.6.0, OpenCL: OpenCL 1.2 CUDA 11.1.70, Vulkan: 1.2.145, Compiler: GCC 10.2.1 20200915 releases/gcc-10.2.0-253-g49b3d88e9d + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: FFLAGS="-g -O3 -feliminate-unused-debug-types -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=32 -m64 -fasynchronous-unwind-tables -Wp,-D_REENTRANT -ftree-loop-distribute-patterns -Wl,-z -Wl,now -Wl,-z -Wl,relro -malign-data=abi -fno-semantic-interposition -ftree-vectorize -ftree-loop-vectorize -Wl,--enable-new-dtags -Wa,-mbranches-within-32B-boundaries" CXXFLAGS="-g -O3 -feliminate-unused-debug-types -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=32 -Wformat -Wformat-security -m64 -fasynchronous-unwind-tables -Wp,-D_REENTRANT -ftree-loop-distribute-patterns -Wl,-z -Wl,now -Wl,-z -Wl,relro -fno-semantic-interposition -ffat-lto-objects -fno-trapping-math -Wl,-sort-common -Wl,--enable-new-dtags -mtune=skylake -Wa,-mbranches-within-32B-boundaries -fvisibility-inlines-hidden -Wl,--enable-new-dtags" FCFLAGS="-g -O3 -feliminate-unused-debug-types -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=32 -m64 -fasynchronous-unwind-tables -Wp,-D_REENTRANT -ftree-loop-distribute-patterns -Wl,-z -Wl,now -Wl,-z -Wl,relro -malign-data=abi -fno-semantic-interposition -ftree-vectorize -ftree-loop-vectorize -Wl,-sort-common -Wl,--enable-new-dtags" CFLAGS="-g -O3 -feliminate-unused-debug-types -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=32 -Wformat -Wformat-security -m64 -fasynchronous-unwind-tables -Wp,-D_REENTRANT -ftree-loop-distribute-patterns -Wl,-z -Wl,now -Wl,-z -Wl,relro -fno-semantic-interposition -ffat-lto-objects -fno-trapping-math -Wl,-sort-common -Wl,--enable-new-dtags -mtune=skylake -Wa,-mbranches-within-32B-boundaries" THEANO_FLAGS="floatX=float32,openmp=true,gcc.cxxflags="-ftree-vectorize -mavx""
Compiler Notes: --build=x86_64-generic-linux --disable-libmpx --disable-libunwind-exceptions --disable-multiarch --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-clocale=gnu --enable-default-pie --enable-gnu-indirect-function --enable-languages=c,c++,fortran,go --enable-ld=default --enable-libstdcxx-pch --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --exec-prefix=/usr --includedir=/usr/include --target=x86_64-generic-linux --with-arch=westmere --with-gcc-major-version-only --with-glibc-version=2.19 --with-gnu-ld --with-isl --with-ppl=yes --with-tune=haswell
Disk Notes: BFQ / relatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 21 September 2020 18:33 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (262.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: Intel 3rd Gen Core, Audio: Intel 7 /C216, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo/Linux, Kernel: 5.8.11-gentoo-x86_64 (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: GCC 9.3.0 + Clang 10.0.1, File-System: f2fs, Screen Resolution: 2880x1800
Compiler Notes: --bindir=/usr/x86_64-gentoo-linux-musl/gcc-bin/9.3.0 --build=x86_64-gentoo-linux-musl --datadir=/usr/share/gcc-data/x86_64-gentoo-linux-musl/9.3.0 --disable-esp --disable-fixed-point --disable-libada --disable-libsanitizer --disable-libssp --disable-libvtv --disable-multilib --disable-nls --disable-systemtap --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --host=x86_64-gentoo-linux-musl --includedir=/usr/lib/gcc/x86_64-gentoo-linux-musl/9.3.0/include --mandir=/usr/share/gcc-data/x86_64-gentoo-linux-musl/9.3.0/man --with-multilib-list=m64 --with-python-dir=/share/gcc-data/x86_64-gentoo-linux-musl/9.3.0/python --without-isl
Disk Notes: MQ-DEADLINE / acl,active_logs=6,alloc_mode=default,background_gc=on,discard,extent_cache,flush_merge,fsync_mode=posix,inline_data,inline_dentry,inline_xattr,lazytime,mode=adaptive,no_heap,noatime,rw,user_xattr
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 25 September 2020 15:35 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (262.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: Intel NVIDIA NVE7 1GB (1200MHz), Audio: Intel 7 /C216, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo/Linux, Kernel: 5.9.11-gentoo-x86_64clang (x86_64), Desktop: LXQt 0.16.0, Display Server: X Server 1.20.8, Display Driver: nouveau 1.0.16, Compiler: GCC 10.2.0 + Clang 11.0.0Target: + LLVM 11.0.0, File-System: f2fs, Screen Resolution: 2880x1800
Disk Notes: MQ-DEADLINE / acl,active_logs=6,alloc_mode=default,background_gc=on,discard,extent_cache,flush_merge,fsync_mode=posix,inline_data,inline_dentry,inline_xattr,lazytime,mode=adaptive,no_heap,relatime,rw,user_xattr / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 29 November 2020 10:11 by user tux.
Disk Notes: MQ-DEADLINE / discard,noatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 1 December 2020 22:48 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (262.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Calculate/Linux, Kernel: 5.4.57-calculate (x86_64), Desktop: MATE 1.24.1, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.1.10, Compiler: GCC 9.3.0 + Clang 11.0.0Target: + LLVM 11.0.0, File-System: ext4, Screen Resolution: 2880x1800
Disk Notes: MQ-DEADLINE / discard,noatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 1 December 2020 23:35 by user tux.
Processor: Intel Core i7-3615QM @ 2.30GHz (8 Cores), Motherboard: Apple MacBookPro10 1 1.0, Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 215GB, Graphics: NVIDIA GeForce GT 650M 981MB, Audio: NVIDIA (0x0e1b) HDA, Monitor: Color LCD
OS: FreeBSD, Kernel: 12.2-RELEASE-p1 (x86_64), Desktop: Xfce 4.14, Display Server: X Server 1.20.9, Display Driver: NVIDIA 1.0.0, Compiler: Clang 10.0.1, File-System: zfs, Screen Resolution: 2880x1800
Security Notes: KPTI
Testing initiated at 5 December 2020 16:49 by user tux.