xsbenchgentoo3

blabla

HTML result view exported from: https://openbenchmarking.org/result/2010295-FI-XSBENCHGE80.

xsbenchgentoo3ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemxsbenchgentooogentoopopentooIntel Xeon E3-1270 v3 @ 3.90GHz (4 Cores / 8 Threads)Intel S1200RP (S1200RP.86B.03.04.0007.082920181422 BIOS)Intel Xeon E3-1200 v3 DRAM4 x 8192 MB DDR3-1600MT/s Micron 18KSF1G72AZ-1G6E14 x 10001GB HGST HUH721010ALMatrox MGA G200e [Pilot]Intel I210Gentoo/Linux5.5.4_horn-5.5.4 (x86_64)GCC 9.2.0 + LLVM 8.0.1xfs5.8.16_horn-5.8.16 (x86_64)GCC 9.3.0 + Clang 10.0.1 + LLVM 10.0.1OpenBenchmarking.orgProcessor Details- xsbenchgentooo: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27- gentoopopentoo: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x28Security Details- xsbenchgentooo: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected - gentoopopentoo: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected

xsbenchgentoo3xsbench: DifferenceStandard ErrorStandard Deviationxsbenchgentooogentoopopentoo9813481.03x3131.590.55%9565751.00x5596.371.01%OpenBenchmarking.org

Xsbench

OpenBenchmarking.orgLookups/s, More Is BetterXsbench 2017-07-06xsbenchgentooogentoopopentoo200K400K600K800K1000KSE +/- 3131.59, N = 3SE +/- 5596.37, N = 3981348956575


Phoronix Test Suite v10.8.4