AMD Athlon XP1700+ on Ubuntu 16.04 (server)
AMD Athlon XP1700+ testing with a ASUS A7A266 (ASUS ACPI BIOS Revision 1012 BIOS) and Matrox Millennium G550 on Ubuntu 16.04 via the Phoronix Test Suite.
gzip_AMD Athlon XP1700+
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: kernel-off STIBP: disabled RSB filling
AMD Athlon XP1700
Compiler Notes: --build=i686-linux-gnu --disable-browser-plugin --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-targets=all --enable-threads=posix --host=i686-linux-gnu --target=i686-linux-gnu --with-arch-32=i686 --with-arch-directory=i386 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: kernel-off STIBP: disabled RSB filling
Timed Firefox Compilation
AMD Athlon XP1700+ - Matrox Millennium G550 - ASUS
AMD Athlon XP1700+
Processor: AMD Athlon XP1700+ @ 1.11GHz (1 Core), Motherboard: ASUS A7A266 (ASUS ACPI BIOS Revision 1012 BIOS), Chipset: ULi M1647 Northbridge, Memory: 1024MB, Disk: 32GB Card Adap, Graphics: Matrox Millennium G550, Network: 2 x Intel 82546GB + Intel 82541PI
OS: Ubuntu 16.04, Kernel: 4.4.0-159-generic (i686), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1280x1024
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: kernel-off STIBP: disabled RSB filling
Gzip Compression
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
OpenSSL
Learn more via the OpenBenchmarking.org test page.
PHP Micro Benchmarks
Various small PHP micro-benchmarks. Learn more via the OpenBenchmarking.org test page.
gzip_AMD Athlon XP1700+
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: kernel-off STIBP: disabled RSB filling
Testing initiated at 7 December 2019 18:42 by user bj0rn.
AMD Athlon XP1700
Compiler Notes: --build=i686-linux-gnu --disable-browser-plugin --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-targets=all --enable-threads=posix --host=i686-linux-gnu --target=i686-linux-gnu --with-arch-32=i686 --with-arch-directory=i386 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: kernel-off STIBP: disabled RSB filling
Testing initiated at 7 December 2019 22:01 by user bj0rn.
Timed Firefox Compilation
Compiler Notes: --build=i686-linux-gnu --disable-browser-plugin --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-targets=all --enable-threads=posix --host=i686-linux-gnu --target=i686-linux-gnu --with-arch-32=i686 --with-arch-directory=i386 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: kernel-off STIBP: disabled RSB filling
Testing initiated at 9 December 2019 17:49 by user bj0rn.
AMD Athlon XP1700+ - Matrox Millennium G550 - ASUS
Compiler Notes: --build=i686-linux-gnu --disable-browser-plugin --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-targets=all --enable-threads=posix --host=i686-linux-gnu --target=i686-linux-gnu --with-arch-32=i686 --with-arch-directory=i386 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: kernel-off STIBP: disabled RSB filling
Testing initiated at 9 December 2019 19:11 by user bj0rn.
AMD Athlon XP1700+
Processor: AMD Athlon XP1700+ @ 1.11GHz (1 Core), Motherboard: ASUS A7A266 (ASUS ACPI BIOS Revision 1012 BIOS), Chipset: ULi M1647 Northbridge, Memory: 1024MB, Disk: 32GB Card Adap, Graphics: Matrox Millennium G550, Network: 2 x Intel 82546GB + Intel 82541PI
OS: Ubuntu 16.04, Kernel: 4.4.0-159-generic (i686), Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1280x1024
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: kernel-off STIBP: disabled RSB filling
Testing initiated at 9 December 2019 20:11 by user bj0rn.