LLVM LVI testing by Michael Larabel for a future article.
Environment Notes: CXXFLAGS=-O3 CFLAGS=-O3
Compiler Notes: Optimized build; Default target: x86_64-unknown-linux-gnu; Host CPU: skylake
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Vulnerable; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Processor: Intel Core i9-9900K @ 5.00GHz (8 Cores / 16 Threads), Motherboard: ASRock Z390M Pro4 (P4.20 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16GB, Disk: 240GB Force MP510, Graphics: Intel UHD 630 (1200MHz), Audio: Realtek ALC892, Monitor: G237HL, Network: Intel I219-V
OS: Ubuntu 20.04, Kernel: 5.4.0-9-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, Compiler: Clang 11.0.0, File-System: ext4, Screen Resolution: 1920x1080
Environment Notes: CXXFLAGS="-O3 -mlvi-cfi" CFLAGS="-O3 -mlvi-cfi"
Compiler Notes: Optimized build; Default target: x86_64-unknown-linux-gnu; Host CPU: skylake
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Vulnerable; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
SMHasher is a hash function tester. Learn more via the OpenBenchmarking.org test page.
LAMMPS is a classical molecular dynamics code, and an acronym for Large-scale Atomic/Molecular Massively Parallel Simulator. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
Dav1d is an open-source, speedy AV1 video decoder. This test profile times how long it takes to decode sample AV1 video content. Learn more via the OpenBenchmarking.org test page.
This is a standard video encoding performance test of Google's libvpx library and the vpxenc command for the VP9/WebM format using a sample 1080p video. Learn more via the OpenBenchmarking.org test page.
This is a simple test of the x264 encoder run on the CPU (OpenCL support disabled) with a sample video file. Learn more via the OpenBenchmarking.org test page.
The Himeno benchmark is a linear solver of pressure Poisson using a point-Jacobi method. Learn more via the OpenBenchmarking.org test page.
This test times how long it takes to encode a sample WAV file to FLAC format five times. Learn more via the OpenBenchmarking.org test page.
LAME is an MP3 encoder licensed under the LGPL. This test measures the time required to encode a WAV file to MP3 format. Learn more via the OpenBenchmarking.org test page.
LevelDB is a key-value storage library developed by Google that supports making use of Snappy for data compression and has other modern features. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of SQLite's speedtest1 benchmark program with an increased problem size of 1,000. Learn more via the OpenBenchmarking.org test page.
This is a test of ab, which is the Apache Benchmark program running against nginx. This test profile measures how many requests per second a given system can sustain when carrying out 2,000,000 requests with 500 requests being carried out concurrently. Learn more via the OpenBenchmarking.org test page.
Environment Notes: CXXFLAGS=-O3 CFLAGS=-O3
Compiler Notes: Optimized build; Default target: x86_64-unknown-linux-gnu; Host CPU: skylake
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Vulnerable; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2020 07:26 by user phoronix.
Processor: Intel Core i9-9900K @ 5.00GHz (8 Cores / 16 Threads), Motherboard: ASRock Z390M Pro4 (P4.20 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16GB, Disk: 240GB Force MP510, Graphics: Intel UHD 630 (1200MHz), Audio: Realtek ALC892, Monitor: G237HL, Network: Intel I219-V
OS: Ubuntu 20.04, Kernel: 5.4.0-9-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, Compiler: Clang 11.0.0, File-System: ext4, Screen Resolution: 1920x1080
Environment Notes: CXXFLAGS="-O3 -mlvi-cfi" CFLAGS="-O3 -mlvi-cfi"
Compiler Notes: Optimized build; Default target: x86_64-unknown-linux-gnu; Host CPU: skylake
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Vulnerable; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 3 April 2020 05:57 by user phoronix.