DISK
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noquota,relatime,rw,seclabel / Block Size: 4096
Security Notes: SELinux + gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Retpoline + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noquota,relatime,rw,seclabel / Block Size: 4096
Python Notes: Python 3.9.19
Security Notes: SELinux + gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Retpoline + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Processor: Intel Core i7-9700 (2 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 21GB VBOX HDD, Graphics: llvmpipe, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: AlmaLinux 9.5, Kernel: 5.14.0-503.11.1.el9_5.x86_64 (x86_64), Desktop: GNOME Shell 40.10, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 24.1.2 (LLVM 18.1.8 256 bits), File-System: xfs, Screen Resolution: 1280x800, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noquota,relatime,rw,seclabel / Block Size: 4096
Security Notes: SELinux + gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Retpoline + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
This test measures how long it takes to extract the .tar.xz Linux kernel source tree package. Learn more via the OpenBenchmarking.org test page.
Compilebench tries to age a filesystem by simulating some of the disk IO common in creating, compiling, patching, stating and reading kernel trees. It indirectly measures how well filesystems can maintain directory locality as the disk fills up and directories age. This current test is setup to use the makej mode with 10 initial directories Learn more via the OpenBenchmarking.org test page.
Test: Read Compiled Tree
DISK1: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result.
Test: Initial Create
DISK1: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result.
Test: Compile
DISK1: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result.
FIO, the Flexible I/O Tester, is an advanced Linux disk benchmark supporting multiple I/O engines and a wealth of options. FIO was written by Jens Axboe for testing of the Linux I/O subsystem and schedulers. Learn more via the OpenBenchmarking.org test page.
Type: Random Read - Engine: IO_uring - Direct: Yes - Block Size: 256KB - Job Count: 2 - Disk Target: Default Test Directory
Disk: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status.
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noquota,relatime,rw,seclabel / Block Size: 4096
Security Notes: SELinux + gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Retpoline + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 4 December 2024 16:51 by user alumno.
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noquota,relatime,rw,seclabel / Block Size: 4096
Python Notes: Python 3.9.19
Security Notes: SELinux + gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Retpoline + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 4 December 2024 16:57 by user alumno.
Processor: Intel Core i7-9700 (2 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 21GB VBOX HDD, Graphics: llvmpipe, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: AlmaLinux 9.5, Kernel: 5.14.0-503.11.1.el9_5.x86_64 (x86_64), Desktop: GNOME Shell 40.10, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 24.1.2 (LLVM 18.1.8 256 bits), File-System: xfs, Screen Resolution: 1280x800, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noquota,relatime,rw,seclabel / Block Size: 4096
Security Notes: SELinux + gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Retpoline + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 4 December 2024 17:02 by user alumno.