1.19-Competitive-v158
1.19-Competitive-v158
T119-v158-CarbonBlack.installed
Processor: 4 x Intel Xeon X5650 (7 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 4096 MB DRAM, Disk: 34GB Virtual disk, Graphics: SVGA3D; build: RELEASE; LLVM;, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: CentOS Linux 7, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 18.3.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1280x768, System Layer: VMware
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x1d
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
T119-v158-CentOS-clean
T119-v158-BestEdr.installed
OS: CentOS Linux 7, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 18.3.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 800x600, System Layer: VMware
T119-v158-CrowdStrike.installed
OS: CentOS Linux 7, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 18.3.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1280x768, System Layer: VMware
T119-v158-Soteria.installed
OS: CentOS Linux 7, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 18.3.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 800x600, System Layer: VMware
T119-v158-SentinelOne.installed
OS: CentOS Linux 7, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 18.3.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1280x768, System Layer: VMware
Apache Benchmark
This is a test of ab, which is the Apache benchmark program. This test profile measures how many requests per second a given system can sustain when carrying out 1,000,000 requests with 100 requests being carried out concurrently. Learn more via the OpenBenchmarking.org test page.
Timed Linux Kernel Compilation
This test times how long it takes to build the Linux kernel in a default configuration. Learn more via the OpenBenchmarking.org test page.
T119-v158-CarbonBlack.installed
Processor: 4 x Intel Xeon X5650 (7 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 4096 MB DRAM, Disk: 34GB Virtual disk, Graphics: SVGA3D; build: RELEASE; LLVM;, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: CentOS Linux 7, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 18.3.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1280x768, System Layer: VMware
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x1d
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
Testing initiated at 27 May 2020 15:16 by user .
T119-v158-CentOS-clean
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x1d
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
Testing initiated at 27 May 2020 15:15 by user .
T119-v158-BestEdr.installed
Processor: 4 x Intel Xeon X5650 (7 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 4096 MB DRAM, Disk: 34GB Virtual disk, Graphics: SVGA3D; build: RELEASE; LLVM;, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: CentOS Linux 7, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 18.3.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 800x600, System Layer: VMware
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x1d
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
Testing initiated at 27 May 2020 15:16 by user .
T119-v158-CrowdStrike.installed
Processor: 4 x Intel Xeon X5650 (7 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 4096 MB DRAM, Disk: 34GB Virtual disk, Graphics: SVGA3D; build: RELEASE; LLVM;, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: CentOS Linux 7, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 18.3.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1280x768, System Layer: VMware
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x1d
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
Testing initiated at 27 May 2020 15:16 by user .
T119-v158-Soteria.installed
Processor: 4 x Intel Xeon X5650 (7 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 4096 MB DRAM, Disk: 34GB Virtual disk, Graphics: SVGA3D; build: RELEASE; LLVM;, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: CentOS Linux 7, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 18.3.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 800x600, System Layer: VMware
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x1d
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
Testing initiated at 27 May 2020 15:16 by user .
T119-v158-SentinelOne.installed
Processor: 4 x Intel Xeon X5650 (7 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 4096 MB DRAM, Disk: 34GB Virtual disk, Graphics: SVGA3D; build: RELEASE; LLVM;, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: CentOS Linux 7, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 18.3.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1280x768, System Layer: VMware
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x1d
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
Testing initiated at 27 May 2020 15:14 by user .