resultados-y-cruncher
prueba y-cruncher
run
Processor: Intel Core i7-7500U (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 2 x 11GB VBOX HDD + VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: 2 x Intel 82540EM
OS: Ubuntu 20.04, Kernel: 5.4.0-64-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2048x2048, System Layer: Oracle VMware
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Y-Cruncher
Y-Cruncher is a multi-threaded Pi benchmark. Learn more via the OpenBenchmarking.org test page.
run
Processor: Intel Core i7-7500U (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 2 x 11GB VBOX HDD + VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: 2 x Intel 82540EM
OS: Ubuntu 20.04, Kernel: 5.4.0-64-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 2048x2048, System Layer: Oracle VMware
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 30 January 2021 19:03 by user mgm.