becnchmark.log
Intel 0000 testing on intel-embedded-system-enabling 1.0 via the Phoronix Test Suite.
Intel 0000
Processor: Intel 0000 @ 4.20GHz (4 Cores / 8 Threads), Motherboard: Intel TigerLake U DDR4 SODIMM RVP v1 (TGLIFUI1.R00.3175.A01.2005062132 BIOS), Chipset: Intel Device a0ef, Memory: 2 x 8192 MB DDR4-3200MT/s 8ATF1G64HZ-3G2E1, Disk: 128GB Extreme Pro, Graphics: (1150MHz), Network: Intel Device 15fb
OS: intel-embedded-system-enabling 1.0, Kernel: 5.4.44-IKT-OSIT-200603T060040Z (x86_64), Desktop: IceWM, Display Server: X Server 1.20.5, Compiler: GCC 9.2.0 +, File-System: ext4
Kernel Notes: i915.force_probe=* i915.enable_guc=2
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Not affected
Perl Benchmarks
Perl benchmark suite that can be used to compare the relative speed of different versions of perl. Learn more via the OpenBenchmarking.org test page.
Intel 0000
Processor: Intel 0000 @ 4.20GHz (4 Cores / 8 Threads), Motherboard: Intel TigerLake U DDR4 SODIMM RVP v1 (TGLIFUI1.R00.3175.A01.2005062132 BIOS), Chipset: Intel Device a0ef, Memory: 2 x 8192 MB DDR4-3200MT/s 8ATF1G64HZ-3G2E1, Disk: 128GB Extreme Pro, Graphics: (1150MHz), Network: Intel Device 15fb
OS: intel-embedded-system-enabling 1.0, Kernel: 5.4.44-IKT-OSIT-200603T060040Z (x86_64), Desktop: IceWM, Display Server: X Server 1.20.5, Compiler: GCC 9.2.0 +, File-System: ext4
Kernel Notes: i915.force_probe=* i915.enable_guc=2
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 7 June 2020 14:50 by user root.