blogbeach
Processor: Intel Core i7-10750H (6 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 9GB VBOX HDD, Graphics: llvmpipe, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: openSUSE 15.6, Kernel: 6.4.0-150600.23.25-default (x86_64), Desktop: KDE Plasma 5.27.11, Display Server: X Server 1.21.1.11, OpenGL: 4.5 Mesa 23.3.4 (LLVM 17.0.6 128 bits), Compiler: GCC 7.5.0, File-System: btrfs, Screen Resolution: 958x960, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-plugin --disable-werror --enable-checking=release --enable-gnu-indirect-function --enable-languages=c,c++,objc,fortran,obj-c++,ada,go --enable-libstdcxx-allocator=new --enable-linux-futex --enable-multilib --enable-offload-targets=hsa,nvptx-none, --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-gcc-major-version-only --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind
Disk Notes: BFQ / relatime,rw,space_cache=v2,subvol=/@/home,subvolid=263 / Block Size: 4096
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
BlogBench is designed to replicate the load of a real-world busy file server by stressing the file-system with multiple threads of random reads, writes, and rewrites. The behavior is mimicked of that of a blog by creating blogs with content and pictures, modifying blog posts, adding comments to these blogs, and then reading the content of the blogs. All of these blogs generated are created locally with fake content and pictures. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-10750H (6 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 9GB VBOX HDD, Graphics: llvmpipe, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: openSUSE 15.6, Kernel: 6.4.0-150600.23.25-default (x86_64), Desktop: KDE Plasma 5.27.11, Display Server: X Server 1.21.1.11, OpenGL: 4.5 Mesa 23.3.4 (LLVM 17.0.6 128 bits), Compiler: GCC 7.5.0, File-System: btrfs, Screen Resolution: 958x960, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-plugin --disable-werror --enable-checking=release --enable-gnu-indirect-function --enable-languages=c,c++,objc,fortran,obj-c++,ada,go --enable-libstdcxx-allocator=new --enable-linux-futex --enable-multilib --enable-offload-targets=hsa,nvptx-none, --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-gcc-major-version-only --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind
Disk Notes: BFQ / relatime,rw,space_cache=v2,subvol=/@/home,subvolid=263 / Block Size: 4096
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 13 November 2024 04:03 by user .