test
Processor: Intel Core i7-7700 @ 4.20GHz (4 Cores / 8 Threads), Motherboard: MSI B250M MORTAR (MS-7A69) v1.0 (2.00 BIOS), Chipset: Intel Xeon E3-1200 v6/7th + B250, Memory: 2 x 8192 MB DDR4-2133MT/s, Disk: 480GB KINGSTON SUV400S, Graphics: MSI NVIDIA GeForce GTX 1070 8GB, Audio: Realtek ALC892, Monitor: BenQ GL2450, Network: Intel I219-V
OS: Red Hat Enterprise Linux 7.6, Kernel: 3.10.0-957.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.1, Display Driver: NVIDIA 460.27.04, OpenGL: 4.6.0, Compiler: GCC 4.8.5 20150623 + CUDA 11.2, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x8e
Security Notes: SELinux + l1tf: Mitigation of PTE Inversion; VMX: SMT vulnerable L1D conditional cache flushes + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel)
This test uses systemd-analyze to report the kernel boot time. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-7700 @ 4.20GHz (4 Cores / 8 Threads), Motherboard: MSI B250M MORTAR (MS-7A69) v1.0 (2.00 BIOS), Chipset: Intel Xeon E3-1200 v6/7th + B250, Memory: 2 x 8192 MB DDR4-2133MT/s, Disk: 480GB KINGSTON SUV400S, Graphics: MSI NVIDIA GeForce GTX 1070 8GB, Audio: Realtek ALC892, Monitor: BenQ GL2450, Network: Intel I219-V
OS: Red Hat Enterprise Linux 7.6, Kernel: 3.10.0-957.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.1, Display Driver: NVIDIA 460.27.04, OpenGL: 4.6.0, Compiler: GCC 4.8.5 20150623 + CUDA 11.2, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x8e
Security Notes: SELinux + l1tf: Mitigation of PTE Inversion; VMX: SMT vulnerable L1D conditional cache flushes + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel)
Testing initiated at 24 February 2021 09:45 by user .