2
ALTRO
2
Processor: Intel Core i7-8700 @ 3.20GHz (6 Cores / 12 Threads), Motherboard: (5.13 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 2 x 16384 MB DDR4-2667MT/s Samsung M471A2K43DB1-CTD, Disk: 500GB CT500MX500SSD1, Graphics: Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC662 rev3, Monitor: U28E570, Network: Intel I219-LM + Intel I211
OS: Red Hat Enterprise Linux Server 7.9, Kernel: 3.10.0-1160.41.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: intel, OpenGL: 4.5 Mesa 18.3.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 3840x2160
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xea
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel) IBPB + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
FFTE
FFTE is a package by Daisuke Takahashi to compute Discrete Fourier Transforms of 1-, 2- and 3- dimensional sequences of length (2^p)*(3^q)*(5^r). Learn more via the OpenBenchmarking.org test page.
2
Processor: Intel Core i7-8700 @ 3.20GHz (6 Cores / 12 Threads), Motherboard: (5.13 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 2 x 16384 MB DDR4-2667MT/s Samsung M471A2K43DB1-CTD, Disk: 500GB CT500MX500SSD1, Graphics: Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC662 rev3, Monitor: U28E570, Network: Intel I219-LM + Intel I211
OS: Red Hat Enterprise Linux Server 7.9, Kernel: 3.10.0-1160.41.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: intel, OpenGL: 4.5 Mesa 18.3.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 3840x2160
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xea
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel) IBPB + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 6 September 2021 17:02 by user root.