Full
2 x Intel Xeon E5405 testing with a Supermicro X7DWU (1.1c BIOS) and AMD ES1000 on Arch Linux via the Phoronix Test Suite.
xeon
Processor: 2 x Intel Xeon E5405 (8 Cores), Motherboard: Supermicro X7DWU (1.1c BIOS), Chipset: Intel 5400 MCH, Memory: 8GB, Disk: 319GB Morphed JBOD 00, Graphics: AMD ES1000, Network: 2 x Intel 82575EB
OS: Arch Linux, Kernel: 5.6.8-arch1-1 (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: CPU Microcode: 0xa0b
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + tsx_async_abort: Not affected
winterfell
Processor: Intel Celeron 1037U @ 1.80GHz (2 Cores), Motherboard: Gigabyte C1037UN-EU (F2 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 4096MB, Disk: 500GB Seagate ST500LM012 HN-M5 + 3001GB Western Digital WD30EZRX-00D, Graphics: Gigabyte Intel HD 2500 (1000MHz), Audio: Realtek ALC887-VD, Network: 2 x Realtek RTL8111/8168/8411
OS: Arch Linux, Kernel: 5.6.6-arch1-1 (x86_64), Display Server: X Server 1.20.0, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected
Timed Linux Kernel Compilation
This test times how long it takes to build the Linux kernel in a default configuration. Learn more via the OpenBenchmarking.org test page.
x264
This is a simple test of the x264 encoder run on the CPU (OpenCL support disabled) with a sample video file. Learn more via the OpenBenchmarking.org test page.
NGINX Benchmark
This is a test of ab, which is the Apache Benchmark program running against nginx. This test profile measures how many requests per second a given system can sustain when carrying out 2,000,000 requests with 500 requests being carried out concurrently. Learn more via the OpenBenchmarking.org test page.
xeon
Processor: 2 x Intel Xeon E5405 (8 Cores), Motherboard: Supermicro X7DWU (1.1c BIOS), Chipset: Intel 5400 MCH, Memory: 8GB, Disk: 319GB Morphed JBOD 00, Graphics: AMD ES1000, Network: 2 x Intel 82575EB
OS: Arch Linux, Kernel: 5.6.8-arch1-1 (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: CPU Microcode: 0xa0b
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + tsx_async_abort: Not affected
Testing initiated at 3 May 2020 11:48 by user nerman.
winterfell
Processor: Intel Celeron 1037U @ 1.80GHz (2 Cores), Motherboard: Gigabyte C1037UN-EU (F2 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 4096MB, Disk: 500GB Seagate ST500LM012 HN-M5 + 3001GB Western Digital WD30EZRX-00D, Graphics: Gigabyte Intel HD 2500 (1000MHz), Audio: Realtek ALC887-VD, Network: 2 x Realtek RTL8111/8168/8411
OS: Arch Linux, Kernel: 5.6.6-arch1-1 (x86_64), Display Server: X Server 1.20.0, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected
Testing initiated at 3 May 2020 21:54 by user nerman.