Browser Test JCC Microcode
Jump Conditional Code Erratum microcode update test for a future article.
Old Microcode
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x200005e
Python Notes: Python 2.7.17rc1 + Python 3.7.5rc1
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
New Microcode
Processor: Intel Core i9-7960X @ 4.40GHz (16 Cores / 32 Threads), Motherboard: MSI X299 SLI PLUS (MS-7A93) v1.0 (1.A0 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 16384MB, Disk: Samsung SSD 970 EVO 250GB + 2000GB SABRENT, Graphics: NVIDIA GeForce RTX 2080 SUPER 8GB (1650/7750MHz), Audio: Realtek ALC1220, Monitor: Acer B286HK, Network: Intel I219-V + Intel I211
OS: Ubuntu 19.10, Kernel: 5.3.0-19-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: NVIDIA 440.31, OpenGL: 4.6.0, Vulkan: 1.1.119, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 3840x2160
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000064
Python Notes: Python 2.7.17rc1 + Python 3.7.5rc1
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Selenium
This test profile uses the Selenium WebDriver for running various browser benchmarks in different available web browsers. Learn more via the OpenBenchmarking.org test page.
Old Microcode
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x200005e
Python Notes: Python 2.7.17rc1 + Python 3.7.5rc1
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 13 November 2019 10:10 by user pts.
New Microcode
Processor: Intel Core i9-7960X @ 4.40GHz (16 Cores / 32 Threads), Motherboard: MSI X299 SLI PLUS (MS-7A93) v1.0 (1.A0 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 16384MB, Disk: Samsung SSD 970 EVO 250GB + 2000GB SABRENT, Graphics: NVIDIA GeForce RTX 2080 SUPER 8GB (1650/7750MHz), Audio: Realtek ALC1220, Monitor: Acer B286HK, Network: Intel I219-V + Intel I211
OS: Ubuntu 19.10, Kernel: 5.3.0-19-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: NVIDIA 440.31, OpenGL: 4.6.0, Vulkan: 1.1.119, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 3840x2160
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2000064
Python Notes: Python 2.7.17rc1 + Python 3.7.5rc1
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 12 November 2019 19:15 by user pts.