Intel 0000 testing on intel-embedded-system-enabling 1.0 via the Phoronix Test Suite.
Kernel Notes: i915.force_probe=* i915.enable_guc=2
Compiler Notes: --bindir=/usr/bin --build=x86_64-linux --datadir=/usr/share --disable-bootstrap --disable-dependency-tracking --disable-libmudflap --disable-libssp --disable-silent-rules --enable-__cxa_atexit --enable-c99 --enable-cet --enable-cheaders=c_global --enable-checking=release --enable-cld --enable-default-pie --enable-default-pie --enable-default-ssp --enable-gnu-unique-object --enable-host-shared --enable-initfini-array --enable-languages=c,c++ --enable-libitm --enable-libstdcxx-pch --enable-long-long --enable-lto --enable-multilib --enable-nls --enable-shared --enable-symvers=gnu --enable-threads=posix --enable-vtable-verify --exec_prefix=/usr --host=x86_64-ese-linux --includedir=/usr/include --localstatedir=/var --mandir=/usr/share/man --oldincludedir=/usr/include --program-prefix=x86_64-ese-linux- --sbindir=/usr/sbin --sharedstatedir=/com --sysconfdir=/etc --target=x86_64-ese-linux --with-build-sysroot=/ --with-glibc-version=2.28 --with-gnu-ld --with-libtool-sysroot=/ --with-linker-hash-style=gnu --with-ppl=no --without-isl --without-local-prefix
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Not affected
Processor: Intel 0000 @ 4.20GHz (4 Cores / 8 Threads), Motherboard: Intel TigerLake U DDR4 SODIMM RVP v1 (TGLIFUI1.R00.3175.A01.2005062132 BIOS), Chipset: Intel Device a0ef, Memory: 2 x 8192 MB DDR4-3200MT/s 8ATF1G64HZ-3G2E1, Disk: 128GB Extreme Pro, Graphics: (1150MHz), Network: Intel Device 15fb
OS: intel-embedded-system-enabling 1.0, Kernel: 5.4.44-IKT-OSIT-200603T060040Z (x86_64), Desktop: IceWM, Display Server: X Server 1.20.5, Compiler: GCC 9.2.0 +, File-System: ext4
Kernel Notes: i915.force_probe=* i915.enable_guc=2
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Not affected
This test runs the ANSI C version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This test is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
This test runs the ANSI C version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This test is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: i915.force_probe=* i915.enable_guc=2
Compiler Notes: --bindir=/usr/bin --build=x86_64-linux --datadir=/usr/share --disable-bootstrap --disable-dependency-tracking --disable-libmudflap --disable-libssp --disable-silent-rules --enable-__cxa_atexit --enable-c99 --enable-cet --enable-cheaders=c_global --enable-checking=release --enable-cld --enable-default-pie --enable-default-pie --enable-default-ssp --enable-gnu-unique-object --enable-host-shared --enable-initfini-array --enable-languages=c,c++ --enable-libitm --enable-libstdcxx-pch --enable-long-long --enable-lto --enable-multilib --enable-nls --enable-shared --enable-symvers=gnu --enable-threads=posix --enable-vtable-verify --exec_prefix=/usr --host=x86_64-ese-linux --includedir=/usr/include --localstatedir=/var --mandir=/usr/share/man --oldincludedir=/usr/include --program-prefix=x86_64-ese-linux- --sbindir=/usr/sbin --sharedstatedir=/com --sysconfdir=/etc --target=x86_64-ese-linux --with-build-sysroot=/ --with-glibc-version=2.28 --with-gnu-ld --with-libtool-sysroot=/ --with-linker-hash-style=gnu --with-ppl=no --without-isl --without-local-prefix
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 7 June 2020 18:52 by user root.
Processor: Intel 0000 @ 4.20GHz (4 Cores / 8 Threads), Motherboard: Intel TigerLake U DDR4 SODIMM RVP v1 (TGLIFUI1.R00.3175.A01.2005062132 BIOS), Chipset: Intel Device a0ef, Memory: 2 x 8192 MB DDR4-3200MT/s 8ATF1G64HZ-3G2E1, Disk: 128GB Extreme Pro, Graphics: (1150MHz), Network: Intel Device 15fb
OS: intel-embedded-system-enabling 1.0, Kernel: 5.4.44-IKT-OSIT-200603T060040Z (x86_64), Desktop: IceWM, Display Server: X Server 1.20.5, Compiler: GCC 9.2.0 +, File-System: ext4
Kernel Notes: i915.force_probe=* i915.enable_guc=2
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 8 June 2020 00:41 by user root.