Intel 0000 testing on intel-embedded-system-enabling 1.0 via the Phoronix Test Suite.
Processor: Intel 0000 @ 4.20GHz (4 Cores / 8 Threads), Motherboard: Intel TigerLake U DDR4 SODIMM RVP v1 (TGLIFUI1.R00.3175.A01.2005062132 BIOS), Chipset: Intel Device a0ef, Memory: 2 x 8192 MB DDR4-3200MT/s 8ATF1G64HZ-3G2E1, Disk: 128GB Extreme Pro, Graphics: (1150MHz), Network: Intel Device 15fb
OS: intel-embedded-system-enabling 1.0, Kernel: 5.4.44-IKT-OSIT-200603T060040Z (x86_64), Desktop: IceWM, Display Server: X Server 1.20.5, Compiler: GCC 9.2.0 +, File-System: ext4
Kernel Notes: i915.force_probe=* i915.enable_guc=2
Compiler Notes: --bindir=/usr/bin --build=x86_64-linux --datadir=/usr/share --disable-bootstrap --disable-dependency-tracking --disable-libmudflap --disable-libssp --disable-silent-rules --enable-__cxa_atexit --enable-c99 --enable-cet --enable-cheaders=c_global --enable-checking=release --enable-cld --enable-default-pie --enable-default-pie --enable-default-ssp --enable-gnu-unique-object --enable-host-shared --enable-initfini-array --enable-languages=c,c++ --enable-libitm --enable-libstdcxx-pch --enable-long-long --enable-lto --enable-multilib --enable-nls --enable-shared --enable-symvers=gnu --enable-threads=posix --enable-vtable-verify --exec_prefix=/usr --host=x86_64-ese-linux --includedir=/usr/include --localstatedir=/var --mandir=/usr/share/man --oldincludedir=/usr/include --program-prefix=x86_64-ese-linux- --sbindir=/usr/sbin --sharedstatedir=/com --sysconfdir=/etc --target=x86_64-ese-linux --with-build-sysroot=/ --with-glibc-version=2.28 --with-gnu-ld --with-libtool-sysroot=/ --with-linker-hash-style=gnu --with-ppl=no --without-isl --without-local-prefix
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Not affected
This is a network socket API performance benchmark. Learn more via the OpenBenchmarking.org test page.
Processor: Intel 0000 @ 4.20GHz (4 Cores / 8 Threads), Motherboard: Intel TigerLake U DDR4 SODIMM RVP v1 (TGLIFUI1.R00.3175.A01.2005062132 BIOS), Chipset: Intel Device a0ef, Memory: 2 x 8192 MB DDR4-3200MT/s 8ATF1G64HZ-3G2E1, Disk: 128GB Extreme Pro, Graphics: (1150MHz), Network: Intel Device 15fb
OS: intel-embedded-system-enabling 1.0, Kernel: 5.4.44-IKT-OSIT-200603T060040Z (x86_64), Desktop: IceWM, Display Server: X Server 1.20.5, Compiler: GCC 9.2.0 +, File-System: ext4
Kernel Notes: i915.force_probe=* i915.enable_guc=2
Compiler Notes: --bindir=/usr/bin --build=x86_64-linux --datadir=/usr/share --disable-bootstrap --disable-dependency-tracking --disable-libmudflap --disable-libssp --disable-silent-rules --enable-__cxa_atexit --enable-c99 --enable-cet --enable-cheaders=c_global --enable-checking=release --enable-cld --enable-default-pie --enable-default-pie --enable-default-ssp --enable-gnu-unique-object --enable-host-shared --enable-initfini-array --enable-languages=c,c++ --enable-libitm --enable-libstdcxx-pch --enable-long-long --enable-lto --enable-multilib --enable-nls --enable-shared --enable-symvers=gnu --enable-threads=posix --enable-vtable-verify --exec_prefix=/usr --host=x86_64-ese-linux --includedir=/usr/include --localstatedir=/var --mandir=/usr/share/man --oldincludedir=/usr/include --program-prefix=x86_64-ese-linux- --sbindir=/usr/sbin --sharedstatedir=/com --sysconfdir=/etc --target=x86_64-ese-linux --with-build-sysroot=/ --with-glibc-version=2.28 --with-gnu-ld --with-libtool-sysroot=/ --with-linker-hash-style=gnu --with-ppl=no --without-isl --without-local-prefix
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 7 June 2020 12:33 by user root.