xsbenchgentoo3

blabla

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2010295-FI-XSBENCHGE80
Jump To Table - Results

View

Do Not Show Noisy Results
Do Not Show Results With Incomplete Data
Do Not Show Results With Little Change/Spread
List Notable Results

Statistics

Show Overall Harmonic Mean(s)
Show Overall Geometric Mean
Show Wins / Losses Counts (Pie Chart)
Normalize Results
Remove Outliers Before Calculating Averages

Graph Settings

Force Line Graphs Where Applicable
Convert To Scalar Where Applicable
Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Highlight
Result
Hide
Result
Result
Identifier
Perf-Per
Dollar
Date
Triggered
  Test
  Duration
xsbenchgentooo
February 17 2020
  5 Minutes
gentoopopentoo
October 29 2020
  5 Minutes
Invert Hiding All Results Option
  5 Minutes


xsbenchgentoo3ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemxsbenchgentooogentoopopentooIntel Xeon E3-1270 v3 @ 3.90GHz (4 Cores / 8 Threads)Intel S1200RP (S1200RP.86B.03.04.0007.082920181422 BIOS)Intel Xeon E3-1200 v3 DRAM4 x 8192 MB DDR3-1600MT/s Micron 18KSF1G72AZ-1G6E14 x 10001GB HGST HUH721010ALMatrox MGA G200e [Pilot]Intel I210Gentoo/Linux5.5.4_horn-5.5.4 (x86_64)GCC 9.2.0 + LLVM 8.0.1xfs5.8.16_horn-5.8.16 (x86_64)GCC 9.3.0 + Clang 10.0.1 + LLVM 10.0.1OpenBenchmarking.orgProcessor Details- xsbenchgentooo: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27- gentoopopentoo: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x28Security Details- xsbenchgentooo: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected - gentoopopentoo: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected

Xsbench

XSBench is a mini-app representing a key computational kernel of the Monte Carlo neutronics application OpenMC. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgLookups/s, More Is BetterXsbench 2017-07-06xsbenchgentooogentoopopentoo200K400K600K800K1000KSE +/- 3131.59, N = 3SE +/- 5596.37, N = 3981348956575
OpenBenchmarking.orgLookups/s, More Is BetterXsbench 2017-07-06xsbenchgentooogentoopopentoo200K400K600K800K1000KMin: 975525 / Avg: 981348 / Max: 986257Min: 946549 / Avg: 956575 / Max: 965897