sandy bridge
Intel Core i7-2700K testing with a BIOSTAR B75MU3B v5.0 (4.6.5 BIOS) and Intel Sandybridge Desktop 2GB on Ubuntu 19.04 via the Phoronix Test Suite.
Intel Core i7-2700K
Processor: Intel Core i7-2700K @ 3.90GHz (4 Cores / 8 Threads), Motherboard: BIOSTAR B75MU3B v5.0 (4.6.5 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8192MB, Disk: 525GB Crucial_CT525MX3, Graphics: Intel Sandybridge Desktop 2GB (1350MHz), Audio: Realtek ALC662 rev1, Monitor: LG Ultra HD, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 19.04, Kernel: 5.0.0-17-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.2, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Appleseed
Appleseed is an open-source production renderer focused on physically-based global illumination rendering engine primarily designed for animation and visual effects. Learn more via the OpenBenchmarking.org test page.
libjpeg-turbo tjbench
tjbench is a JPEG decompression/compression benchmark part of libjpeg-turbo. Learn more via the OpenBenchmarking.org test page.
Timed GCC Compilation
This test times how long it takes to build the GNU Compiler Collection (GCC). Learn more via the OpenBenchmarking.org test page.
John The Ripper
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
Intel Core i7-2700K
Processor: Intel Core i7-2700K @ 3.90GHz (4 Cores / 8 Threads), Motherboard: BIOSTAR B75MU3B v5.0 (4.6.5 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8192MB, Disk: 525GB Crucial_CT525MX3, Graphics: Intel Sandybridge Desktop 2GB (1350MHz), Audio: Realtek ALC662 rev1, Monitor: LG Ultra HD, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 19.04, Kernel: 5.0.0-17-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.2, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 18 July 2019 21:52 by user phoronix.