bbb
ccc
vvv
Processor: Intel Core 2 Quad Q9300 @ 2.50GHz (4 Cores), Motherboard: PEGATRON Eureka3 v1.01 (5.07 BIOS), Chipset: Intel 4 DRAM + ICH10, Memory: 8192MB, Disk: 1000GB Western Digital WD10EADS-65L + 250GB Samsung SSD 850 + 62GB Micro OTG, Graphics: NVIDIA GeForce GT 230 2GB (500/500MHz), Audio: Realtek ALC888, Monitor: HP 22xi, Network: Realtek RTL8111/8168/8411 + Ralink RT2790 802.11n 1T/2R
OS: Ubuntu 19.10, Kernel: 5.3.0-24-generic (x86_64), Desktop: KDE Plasma 5.16.5, Display Server: X Server 1.20.5, Display Driver: NVIDIA 340.107, OpenGL: 3.3.0, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Y-Cruncher
Y-Cruncher is a multi-threaded Pi benchmark. Learn more via the OpenBenchmarking.org test page.
vvv
Processor: Intel Core 2 Quad Q9300 @ 2.50GHz (4 Cores), Motherboard: PEGATRON Eureka3 v1.01 (5.07 BIOS), Chipset: Intel 4 DRAM + ICH10, Memory: 8192MB, Disk: 1000GB Western Digital WD10EADS-65L + 250GB Samsung SSD 850 + 62GB Micro OTG, Graphics: NVIDIA GeForce GT 230 2GB (500/500MHz), Audio: Realtek ALC888, Monitor: HP 22xi, Network: Realtek RTL8111/8168/8411 + Ralink RT2790 802.11n 1T/2R
OS: Ubuntu 19.10, Kernel: 5.3.0-24-generic (x86_64), Desktop: KDE Plasma 5.16.5, Display Server: X Server 1.20.5, Display Driver: NVIDIA 340.107, OpenGL: 3.3.0, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 24 November 2019 19:34 by user turro.