test1
Xanmod 6300hq fedora31
Xanmod Test
Processor: Intel Core i5-6300HQ @ 3.20GHz (4 Cores), Motherboard: MSI MS-16J6 (E16J6IMS.10C BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 8192MB, Disk: 120GB Western Digital WDS120G2G0B + 1000GB HGST HTS721010A9, Graphics: Intel HD 530 (950MHz), Audio: Realtek ALC892, Network: Qualcomm Atheros QCA8171 + Intel 3165
OS: Fedora 31, Kernel: 5.4.12-xanmod7 (x86_64), Desktop: GNOME Shell 3.34.3, Display Server: X Server 1.20.6, Display Driver: modesetting 1.20.6, OpenGL: 4.5 Mesa 19.2.8, Compiler: GCC 9.2.1 20190827, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Smallpt
Smallpt is a C++ global illumination renderer written in less than 100 lines of code. Global illumination is done via unbiased Monte Carlo path tracing and there is multi-threading support via the OpenMP library. Learn more via the OpenBenchmarking.org test page.
Xanmod Test
Processor: Intel Core i5-6300HQ @ 3.20GHz (4 Cores), Motherboard: MSI MS-16J6 (E16J6IMS.10C BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 8192MB, Disk: 120GB Western Digital WDS120G2G0B + 1000GB HGST HTS721010A9, Graphics: Intel HD 530 (950MHz), Audio: Realtek ALC892, Network: Qualcomm Atheros QCA8171 + Intel 3165
OS: Fedora 31, Kernel: 5.4.12-xanmod7 (x86_64), Desktop: GNOME Shell 3.34.3, Display Server: X Server 1.20.6, Display Driver: modesetting 1.20.6, OpenGL: 4.5 Mesa 19.2.8, Compiler: GCC 9.2.1 20190827, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 23 January 2020 10:48 by user loradona.