Intel Core i7-3615QM testing with a Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS) and Intel HD 4000 on VoidLinux rolling via the Phoronix Test Suite.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-march=ivybridge -O3" CFLAGS="-march=ivybridge -O3"
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-march=ivybridge -O3" CFLAGS="-march=ivybridge -O3"
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-O3 -march=ivybridge -flto=8" CFLAGS="-O3 -march=ivybridge -flto=8"
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-O3 -march=ivybridge -flto=thin" CFLAGS="-O3 -march=ivybridge -flto=thin"
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Security Notes: KPTI
Processor: Intel Core i7-3615QM @ 2.30GHz (8 Cores), Motherboard: Apple MacBookPro10 1 1.0, Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: APPLE SSD SM256E CXM09A1Q + JMicron Generic 8101, Audio: NVIDIA (0x0e1b) HDA
OS: FreeBSD, Kernel: 12.1-RELEASE-p8 (x86_64), Display Server: X Server 1.20.8, Display Driver: NVIDIA 1.0.0, Compiler: Clang 8.0.1 (SVN 366581), File-System: zfs, Screen Resolution: 2880x1800
Processor: Intel Core i7-3615QM @ 2.30GHz (8 Cores), Motherboard: Apple MacBookPro10 1 1.0, Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 213GB, Graphics: Unknown 981MB, Audio: NVIDIA (0x0e1b) HDA
OS: FreeBSD, Kernel: 12.1-RELEASE (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: Clang 8.0.1 (SVN 366581), File-System: zfs, Screen Resolution: 2880x1800
Environment Notes: LIBGL_ALWAYS_SOFTWARE=1
Security Notes: KPTI
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: Intel HD 4000, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom NetXtreme BCM57762 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: VoidLinux rolling, Kernel: 5.8.9_1 (x86_64), Display Server: X Server 1.20.9, Display Driver: intel 2.99.917, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 2880x1800
Compiler Notes: --build=x86_64-linux-musl --disable-libsanitizer --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-symvers --disable-target-libiberty --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-fast-character --enable-languages=c,c++,objc,obj-c++,fortran,lto,go,ada --enable-lto --enable-plugins --enable-serial-configure --enable-shared --enable-threads=posix --enable-vtable-verify --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
This is a benchmark of Sysbench with CPU and memory sub-tests. Learn more via the OpenBenchmarking.org test page.
A portable GPL 3D software renderer that supports OpenMP and Intel Threading Building Blocks with many different rendering modes. This version does not use OpenGL but is entirely CPU/software based. Learn more via the OpenBenchmarking.org test page.
This is a test of GraphicsMagick with its OpenMP implementation that performs various imaging tests on a sample 6000x4000 pixel JPEG image. Learn more via the OpenBenchmarking.org test page.
This is a test of EEMBC CoreMark processor benchmark. Learn more via the OpenBenchmarking.org test page.
This test measures the time needed to compress a sample file (an Ubuntu ISO) using Zstd compression. Learn more via the OpenBenchmarking.org test page.
This is a test of asmFish, an advanced chess benchmark written in Assembly. Learn more via the OpenBenchmarking.org test page.
Primesieve generates prime numbers using a highly optimized sieve of Eratosthenes implementation. Primesieve benchmarks the CPU's L1/L2 cache performance. Learn more via the OpenBenchmarking.org test page.
Based on petehunt/rust-benchmark, this is a prime number benchmark that is multi-threaded and written in Rustlang. Learn more via the OpenBenchmarking.org test page.
AOBench is a lightweight ambient occlusion renderer, written in C. The test profile is using a size of 2048 x 2048. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 19 August 2020 18:28 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 19 August 2020 21:28 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 19 August 2020 23:49 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-march=ivybridge -O3" CFLAGS="-march=ivybridge -O3"
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 20 August 2020 08:25 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-march=ivybridge -O3" CFLAGS="-march=ivybridge -O3"
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 20 August 2020 10:52 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-O3 -march=ivybridge -flto=8" CFLAGS="-O3 -march=ivybridge -flto=8"
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 20 August 2020 14:04 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-xanmod1-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: Clang 10.0.1 + GCC 10.2.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Environment Notes: CXXFLAGS="-O3 -march=ivybridge -flto=thin" CFLAGS="-O3 -march=ivybridge -flto=thin"
Compiler Notes: Optimized build; Default target: x86_64-pc-linux-gnu; Host CPU: ivybridge
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 20 August 2020 15:21 by user tux.
Security Notes: KPTI
Testing initiated at 5 September 2020 12:06 by user root.
Processor: Intel Core i7-3615QM @ 2.30GHz (8 Cores), Motherboard: Apple MacBookPro10 1 1.0, Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: APPLE SSD SM256E CXM09A1Q + JMicron Generic 8101, Audio: NVIDIA (0x0e1b) HDA
OS: FreeBSD, Kernel: 12.1-RELEASE-p8 (x86_64), Display Server: X Server 1.20.8, Display Driver: NVIDIA 1.0.0, Compiler: Clang 8.0.1 (SVN 366581), File-System: zfs, Screen Resolution: 2880x1800
Security Notes: KPTI
Testing initiated at 5 September 2020 13:37 by user root.
Processor: Intel Core i7-3615QM @ 2.30GHz (8 Cores), Motherboard: Apple MacBookPro10 1 1.0, Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 213GB, Graphics: Unknown 981MB, Audio: NVIDIA (0x0e1b) HDA
OS: FreeBSD, Kernel: 12.1-RELEASE (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: Clang 8.0.1 (SVN 366581), File-System: zfs, Screen Resolution: 2880x1800
Environment Notes: LIBGL_ALWAYS_SOFTWARE=1
Security Notes: KPTI
Testing initiated at 11 September 2020 10:54 by user tux.
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: Intel HD 4000, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom NetXtreme BCM57762 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: VoidLinux rolling, Kernel: 5.8.9_1 (x86_64), Display Server: X Server 1.20.9, Display Driver: intel 2.99.917, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 2880x1800
Compiler Notes: --build=x86_64-linux-musl --disable-libsanitizer --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-symvers --disable-target-libiberty --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-fast-character --enable-languages=c,c++,objc,obj-c++,fortran,lto,go,ada --enable-lto --enable-plugins --enable-serial-configure --enable-shared --enable-threads=posix --enable-vtable-verify --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 16 September 2020 19:37 by user .