SuseLeap-wks1-asmfish-18a0g2020
VMware testing on openSUSE 15.2 via the Phoronix Test Suite.
8 x AMD Ryzen Threadripper 3960X 24-Core
Processor: 8 x AMD Ryzen Threadripper 3960X 24-Core (16 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 16GB, Disk: 107GB VMware Virtual S, Graphics: SVGA3D; build: RELEASE; LLVM;, Audio: Ensoniq ES1371/ES1373, Network: 2 x Intel 82545EM + 3 x AMD 79c970
OS: openSUSE 15.2, Kernel: 5.3.18-lp152.33-default (x86_64), Desktop: KDE Plasma 5.18.5, Display Server: X Server 1.20.3, Display Driver: modesetting 1.20.3, OpenGL: 2.1 Mesa 19.3.4, Compiler: GCC 7.5.0, File-System: btrfs, Screen Resolution: 1920x1080, System Layer: VMware
Processor Notes: CPU Microcode: 0x8301039
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
asmFish
This is a test of asmFish, an advanced chess benchmark written in Assembly. Learn more via the OpenBenchmarking.org test page.
8 x AMD Ryzen Threadripper 3960X 24-Core
Processor: 8 x AMD Ryzen Threadripper 3960X 24-Core (16 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 16GB, Disk: 107GB VMware Virtual S, Graphics: SVGA3D; build: RELEASE; LLVM;, Audio: Ensoniq ES1371/ES1373, Network: 2 x Intel 82545EM + 3 x AMD 79c970
OS: openSUSE 15.2, Kernel: 5.3.18-lp152.33-default (x86_64), Desktop: KDE Plasma 5.18.5, Display Server: X Server 1.20.3, Display Driver: modesetting 1.20.3, OpenGL: 2.1 Mesa 19.3.4, Compiler: GCC 7.5.0, File-System: btrfs, Screen Resolution: 1920x1080, System Layer: VMware
Processor Notes: CPU Microcode: 0x8301039
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 18 August 2020 16:25 by user odigiccta.