xsbenchgentoo3
blabla
xsbenchgentooo
Processor: Intel Xeon E3-1270 v3 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Intel S1200RP (S1200RP.86B.03.04.0007.082920181422 BIOS), Chipset: Intel Xeon E3-1200 v3 DRAM, Memory: 4 x 8192 MB DDR3-1600MT/s Micron 18KSF1G72AZ-1G6E1, Disk: 4 x 10001GB HGST HUH721010AL, Graphics: Matrox MGA G200e [Pilot], Network: Intel I210
OS: Gentoo/Linux, Kernel: 5.5.4_horn-5.5.4 (x86_64), Compiler: GCC 9.2.0 + LLVM 8.0.1, File-System: xfs
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected
gentoopopentoo
OS: Gentoo/Linux, Kernel: 5.8.16_horn-5.8.16 (x86_64), Compiler: GCC 9.3.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: xfs
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x28
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Xsbench
XSBench is a mini-app representing a key computational kernel of the Monte Carlo neutronics application OpenMC. Learn more via the OpenBenchmarking.org test page.
xsbenchgentooo
Processor: Intel Xeon E3-1270 v3 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Intel S1200RP (S1200RP.86B.03.04.0007.082920181422 BIOS), Chipset: Intel Xeon E3-1200 v3 DRAM, Memory: 4 x 8192 MB DDR3-1600MT/s Micron 18KSF1G72AZ-1G6E1, Disk: 4 x 10001GB HGST HUH721010AL, Graphics: Matrox MGA G200e [Pilot], Network: Intel I210
OS: Gentoo/Linux, Kernel: 5.5.4_horn-5.5.4 (x86_64), Compiler: GCC 9.2.0 + LLVM 8.0.1, File-System: xfs
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected
Testing initiated at 17 February 2020 08:15 by user root.
gentoopopentoo
Processor: Intel Xeon E3-1270 v3 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Intel S1200RP (S1200RP.86B.03.04.0007.082920181422 BIOS), Chipset: Intel Xeon E3-1200 v3 DRAM, Memory: 4 x 8192 MB DDR3-1600MT/s Micron 18KSF1G72AZ-1G6E1, Disk: 4 x 10001GB HGST HUH721010AL, Graphics: Matrox MGA G200e [Pilot], Network: Intel I210
OS: Gentoo/Linux, Kernel: 5.8.16_horn-5.8.16 (x86_64), Compiler: GCC 9.3.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: xfs
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x28
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 29 October 2020 08:48 by user root.