Jump Conditional Code Erratum microcode update test for a future article.
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x200005e
Python Notes: Python 2.7.17rc1 + Python 3.7.5rc1
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Processor: Intel Core i9-7960X @ 4.40GHz (16 Cores / 32 Threads), Motherboard: MSI X299 SLI PLUS (MS-7A93) v1.0 (1.A0 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 16384MB, Disk: Samsung SSD 970 EVO 250GB + 2000GB SABRENT, Graphics: NVIDIA GeForce RTX 2080 SUPER 8GB (1650/7750MHz), Audio: Realtek ALC1220, Monitor: Acer B286HK, Network: Intel I219-V + Intel I211
OS: Ubuntu 19.10, Kernel: 5.3.0-19-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: NVIDIA 440.31, OpenGL: 4.6.0, Vulkan: 1.1.119, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 3840x2160
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000064
Python Notes: Python 2.7.17rc1 + Python 3.7.5rc1
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
This test profile uses the Selenium WebDriver for running various browser benchmarks in different available web browsers. Learn more via the OpenBenchmarking.org test page.
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x200005e
Python Notes: Python 2.7.17rc1 + Python 3.7.5rc1
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 13 November 2019 10:10 by user pts.
Processor: Intel Core i9-7960X @ 4.40GHz (16 Cores / 32 Threads), Motherboard: MSI X299 SLI PLUS (MS-7A93) v1.0 (1.A0 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 16384MB, Disk: Samsung SSD 970 EVO 250GB + 2000GB SABRENT, Graphics: NVIDIA GeForce RTX 2080 SUPER 8GB (1650/7750MHz), Audio: Realtek ALC1220, Monitor: Acer B286HK, Network: Intel I219-V + Intel I211
OS: Ubuntu 19.10, Kernel: 5.3.0-19-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: NVIDIA 440.31, OpenGL: 4.6.0, Vulkan: 1.1.119, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 3840x2160
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000064
Python Notes: Python 2.7.17rc1 + Python 3.7.5rc1
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 12 November 2019 19:15 by user pts.