resultadoDolfyn
1
1
Processor: Intel Core i7-2600K (2 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 21GB VBOX HDD, Graphics: llvmpipe, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: AlmaLinux 9.2, Kernel: 5.14.0-284.30.1.el9_2.x86_64 (x86_64), Desktop: GNOME Shell 40.10, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 22.3.0 (LLVM 15.0.7 256 bits), File-System: xfs, Screen Resolution: 1440x797, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: always
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Dolfyn
Dolfyn is a Computational Fluid Dynamics (CFD) code of modern numerical simulation techniques. The Dolfyn test profile measures the execution time of the bundled computational fluid dynamics demos that are bundled with Dolfyn. Learn more via the OpenBenchmarking.org test page.
1
Processor: Intel Core i7-2600K (2 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 21GB VBOX HDD, Graphics: llvmpipe, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: AlmaLinux 9.2, Kernel: 5.14.0-284.30.1.el9_2.x86_64 (x86_64), Desktop: GNOME Shell 40.10, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 22.3.0 (LLVM 15.0.7 256 bits), File-System: xfs, Screen Resolution: 1440x797, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: always
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 November 2023 18:11 by user root.