x5670@4ghz
Intel Xeon X5670 testing with a Gigabyte EX58-UD5 (F13 BIOS) and NVIDIA GeForce GTX 1060 6GB on Antergos Linux via the Phoronix Test Suite.
x5670@4ghz
Processor: Intel Xeon X5670 (6 Cores / 12 Threads), Motherboard: Gigabyte EX58-UD5 (F13 BIOS), Chipset: Intel 5520/5500/X58 + ICH10R, Memory: 12288MB, Disk: 250GB Samsung SSD 840 + 750GB SAMSUNG HD753LJ, Graphics: NVIDIA GeForce GTX 1060 6GB (1506/4006MHz), Audio: Realtek ALC889A, Monitor: ASUS PB278, Network: 2 x Realtek RTL8111/8168/8411
OS: Antergos Linux, Kernel: 5.1.16-arch1-1-ARCH (x86_64), Desktop: Cinnamon 4.2.0, Display Server: X Server 1.20.5, Display Driver: NVIDIA 418.52.10, OpenGL: 4.6.0, Compiler: GCC 9.1.0, File-System: btrfs, Screen Resolution: 2560x1440
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Go Benchmarks
Benchmark for monitoring real time performance of the Go implementation for HTTP, JSON and garbage testing per iteration. Learn more via the OpenBenchmarking.org test page.
x5670@4ghz
Processor: Intel Xeon X5670 (6 Cores / 12 Threads), Motherboard: Gigabyte EX58-UD5 (F13 BIOS), Chipset: Intel 5520/5500/X58 + ICH10R, Memory: 12288MB, Disk: 250GB Samsung SSD 840 + 750GB SAMSUNG HD753LJ, Graphics: NVIDIA GeForce GTX 1060 6GB (1506/4006MHz), Audio: Realtek ALC889A, Monitor: ASUS PB278, Network: 2 x Realtek RTL8111/8168/8411
OS: Antergos Linux, Kernel: 5.1.16-arch1-1-ARCH (x86_64), Desktop: Cinnamon 4.2.0, Display Server: X Server 1.20.5, Display Driver: NVIDIA 418.52.10, OpenGL: 4.6.0, Compiler: GCC 9.1.0, File-System: btrfs, Screen Resolution: 2560x1440
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 10 July 2019 23:25 by user gabor.