Intel Core i7-3615QM testing with a Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS) and NVIDIA NVE7 1GB on Gentoo 2.6 via the Phoronix Test Suite.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-march=ivybridge -O3" CFLAGS="-march=ivybridge -O3"
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-march=ivybridge -O3" CFLAGS="-march=ivybridge -O3"
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-O3 -march=ivybridge -flto=8" CFLAGS="-O3 -march=ivybridge -flto=8"
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-O3 -march=ivybridge -flto=thin" CFLAGS="-O3 -march=ivybridge -flto=thin"
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
This test measures the time needed to compress a sample file (an Ubuntu ISO) using Zstd compression. Learn more via the OpenBenchmarking.org test page.
This is a test of GraphicsMagick with its OpenMP implementation that performs various imaging tests on a sample 6000x4000 pixel JPEG image. Learn more via the OpenBenchmarking.org test page.
A portable GPL 3D software renderer that supports OpenMP and Intel Threading Building Blocks with many different rendering modes. This version does not use OpenGL but is entirely CPU/software based. Learn more via the OpenBenchmarking.org test page.
This is a test of EEMBC CoreMark processor benchmark. Learn more via the OpenBenchmarking.org test page.
This is a test of asmFish, an advanced chess benchmark written in Assembly. Learn more via the OpenBenchmarking.org test page.
Primesieve generates prime numbers using a highly optimized sieve of Eratosthenes implementation. Primesieve benchmarks the CPU's L1/L2 cache performance. Learn more via the OpenBenchmarking.org test page.
Based on petehunt/rust-benchmark, this is a prime number benchmark that is multi-threaded and written in Rustlang. Learn more via the OpenBenchmarking.org test page.
AOBench is a lightweight ambient occlusion renderer, written in C. The test profile is using a size of 2048 x 2048. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Sysbench with CPU and memory sub-tests. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 19 August 2020 18:28 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 19 August 2020 21:28 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 19 August 2020 23:49 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-march=ivybridge -O3" CFLAGS="-march=ivybridge -O3"
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 20 August 2020 08:25 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-march=ivybridge -O3" CFLAGS="-march=ivybridge -O3"
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 20 August 2020 10:52 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-O3 -march=ivybridge -flto=8" CFLAGS="-O3 -march=ivybridge -flto=8"
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 20 August 2020 14:04 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-O3 -march=ivybridge -flto=thin" CFLAGS="-O3 -march=ivybridge -flto=thin"
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 20 August 2020 15:21 by user tux.