AMD Athlon XP1700+ testing with a ASUS A7A266 (ASUS ACPI BIOS Revision 1012 BIOS) and Matrox Millennium G550 on Ubuntu 16.04 via the Phoronix Test Suite.
Compiler Notes: --build=i686-linux-gnu --disable-browser-plugin --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-targets=all --enable-threads=posix --host=i686-linux-gnu --target=i686-linux-gnu --with-arch-32=i686 --with-arch-directory=i386 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline
Processor: AMD Athlon XP1700+ @ 1.11GHz (1 Core), Motherboard: ASUS A7A266 (ASUS ACPI BIOS Revision 1012 BIOS), Chipset: ULi M1647 Northbridge, Memory: 1024MB, Disk: 32GB Card Adap, Graphics: Matrox Millennium G550, Network: 2 x Intel 82546GB + Intel 82541PI
OS: Ubuntu 16.04, Kernel: 4.4.0-151-generic (i686), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1280x1024
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline
Various small PHP micro-benchmarks. Learn more via the OpenBenchmarking.org test page.
Learn more via the OpenBenchmarking.org test page.
Compiler Notes: --build=i686-linux-gnu --disable-browser-plugin --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-targets=all --enable-threads=posix --host=i686-linux-gnu --target=i686-linux-gnu --with-arch-32=i686 --with-arch-directory=i386 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline
Testing initiated at 21 June 2019 19:46 by user bj0rn.
Compiler Notes: --build=i686-linux-gnu --disable-browser-plugin --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-targets=all --enable-threads=posix --host=i686-linux-gnu --target=i686-linux-gnu --with-arch-32=i686 --with-arch-directory=i386 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline
Testing initiated at 21 June 2019 21:46 by user bj0rn.
Processor: AMD Athlon XP1700+ @ 1.11GHz (1 Core), Motherboard: ASUS A7A266 (ASUS ACPI BIOS Revision 1012 BIOS), Chipset: ULi M1647 Northbridge, Memory: 1024MB, Disk: 32GB Card Adap, Graphics: Matrox Millennium G550, Network: 2 x Intel 82546GB + Intel 82541PI
OS: Ubuntu 16.04, Kernel: 4.4.0-151-generic (i686), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1280x1024
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline
Testing initiated at 21 June 2019 23:20 by user bj0rn.