generic-cpu
Intel Core i3-6320 testing with a ASUS P10S-I (4503 BIOS) and ASPEED on Debian 10 via the Phoronix Test Suite.
Intel Core i3-6320
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xcc
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Intel Core i3-6320 - ASPEED - ASUS P10S-I (4503 BIOS)
Processor: Intel Core i3-6320 @ 3.90GHz (2 Cores / 4 Threads), Motherboard: ASUS P10S-I (4503 BIOS), Chipset: Intel Skylake, Memory: 2 x 16384 MB DDR4-2667MT/s Micron 18ASF2G72AZ-2G6D1, Disk: 256GB NE-256 + 2 x 1000GB Hitachi HUA72201 + 2 x 3001GB Seagate ST3000DM001-1ER1 + 2 x 1000GB Seagate ST1000NM0033-9ZM + 240GB 2115, Graphics: ASPEED, Network: 2 x Intel I210
OS: Debian 10, Kernel: 5.4.78-2-pve (x86_64), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1024x768
Cryptsetup
This is a test profile for running the cryptsetup benchmark to report on the system's cryptography performance. Learn more via the OpenBenchmarking.org test page.
Nettle
GNU Nettle is a low-level cryptographic library. Learn more via the OpenBenchmarking.org test page.
Botan
Botan is a cross-platform open-source C++ crypto library that supports most all publicly known cryptographic algorithms. Learn more via the OpenBenchmarking.org test page.
Cryptsetup
This is a test profile for running the cryptsetup benchmark to report on the system's cryptography performance. Learn more via the OpenBenchmarking.org test page.
Apache Benchmark
This is a test of ab, which is the Apache benchmark program. This test profile measures how many requests per second a given system can sustain when carrying out 1,000,000 requests with 100 requests being carried out concurrently. Learn more via the OpenBenchmarking.org test page.
Go Benchmarks
Benchmark for monitoring real time performance of the Go implementation for HTTP, JSON and garbage testing per iteration. Learn more via the OpenBenchmarking.org test page.
Intel Core i3-6320
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xcc
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 23 January 2021 22:20 by user chusavitin2.
Intel Core i3-6320 - ASPEED - ASUS P10S-I (4503 BIOS)
Processor: Intel Core i3-6320 @ 3.90GHz (2 Cores / 4 Threads), Motherboard: ASUS P10S-I (4503 BIOS), Chipset: Intel Skylake, Memory: 2 x 16384 MB DDR4-2667MT/s Micron 18ASF2G72AZ-2G6D1, Disk: 256GB NE-256 + 2 x 1000GB Hitachi HUA72201 + 2 x 3001GB Seagate ST3000DM001-1ER1 + 2 x 1000GB Seagate ST1000NM0033-9ZM + 240GB 2115, Graphics: ASPEED, Network: 2 x Intel I210
OS: Debian 10, Kernel: 5.4.78-2-pve (x86_64), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xcc
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 23 January 2021 22:23 by user chusavitin2.