nebula
Kernel Notes: libata.allow_tpm=1 - Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,m2 --enable-libphobos-checking=release --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-link-mutex --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-10-Km9U7s/gcc-10-10.2.1/debian/tmp-nvptx/usr,amdgcn-amdhsa=/build/gcc-10-Km9U7s/gcc-10-10.2.1/debian/tmp-gcn/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-build-config=bootstrap-lto-lean --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Disk Scheduler Notes: MQ-DEADLINE
Python Notes: Python 3.9.2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: ASUS P8H77-M PRO (9012 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 32GB, Disk: 7 x 4001GB HGST HMS5C4040BL + 256GB Generic, Graphics: ASUS Intel Xeon E3-1200 v2/3rd Gen Core (1150MHz), Network: Realtek RTL8111/8168/8411
OS: Debian 11, Kernel: 5.10.120+truenas (x86_64), Vulkan: 1.0.2, Compiler: GCC 10.2.1 20210110, File-System: zfs, Screen Resolution: 1024x768
Kernel Notes: libata.allow_tpm=1 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Disk Scheduler Notes: MQ-DEADLINE
Python Notes: Python 3.9.2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
FS_Mark is designed to test a system's file-system performance. Learn more via the OpenBenchmarking.org test page.
Compilebench tries to age a filesystem by simulating some of the disk IO common in creating, compiling, patching, stating and reading kernel trees. It indirectly measures how well filesystems can maintain directory locality as the disk fills up and directories age. This current test is setup to use the makej mode with 10 initial directories Learn more via the OpenBenchmarking.org test page.
Kernel Notes: libata.allow_tpm=1 - Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,m2 --enable-libphobos-checking=release --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-link-mutex --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-10-Km9U7s/gcc-10-10.2.1/debian/tmp-nvptx/usr,amdgcn-amdhsa=/build/gcc-10-Km9U7s/gcc-10-10.2.1/debian/tmp-gcn/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-build-config=bootstrap-lto-lean --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Disk Scheduler Notes: MQ-DEADLINE
Python Notes: Python 3.9.2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 6 August 2022 19:39 by user asvany.
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: ASUS P8H77-M PRO (9012 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 32GB, Disk: 7 x 4001GB HGST HMS5C4040BL + 256GB Generic, Graphics: ASUS Intel Xeon E3-1200 v2/3rd Gen Core (1150MHz), Network: Realtek RTL8111/8168/8411
OS: Debian 11, Kernel: 5.10.120+truenas (x86_64), Vulkan: 1.0.2, Compiler: GCC 10.2.1 20210110, File-System: zfs, Screen Resolution: 1024x768
Kernel Notes: libata.allow_tpm=1 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Disk Scheduler Notes: MQ-DEADLINE
Python Notes: Python 3.9.2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 6 August 2022 23:32 by user asvany.