fds
fgsdgd
fgsd
Processor: Intel Core i5-6600 @ 3.90GHz (4 Cores), Motherboard: MSI H110M PRO-VD (MS-7996) v1.0 (2.70 BIOS), Chipset: Intel Skylake, Memory: 1 x 16384 MB DDR4-2133MHz, Disk: 120GB INTENSO SATA III, Graphics: eVGA NVIDIA GeForce GTX 1060 6GB (1506/4006MHz), Audio: Realtek ALC887-VD, Monitor: C24F390, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR9485
OS: Debian 9.9, Kernel: 4.9.0-9-amd64 (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.19.2, Display Driver: NVIDIA 390.116, OpenGL: 4.5.0, Compiler: GCC 6.3.0 20170516, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Sample Pass Fail
An example test profile of handling pass/fail type testing rather than performance related. Learn more via the OpenBenchmarking.org test page.
fgsd
Processor: Intel Core i5-6600 @ 3.90GHz (4 Cores), Motherboard: MSI H110M PRO-VD (MS-7996) v1.0 (2.70 BIOS), Chipset: Intel Skylake, Memory: 1 x 16384 MB DDR4-2133MHz, Disk: 120GB INTENSO SATA III, Graphics: eVGA NVIDIA GeForce GTX 1060 6GB (1506/4006MHz), Audio: Realtek ALC887-VD, Monitor: C24F390, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR9485
OS: Debian 9.9, Kernel: 4.9.0-9-amd64 (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.19.2, Display Driver: NVIDIA 390.116, OpenGL: 4.5.0, Compiler: GCC 6.3.0 20170516, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 1 July 2019 22:12 by user root.