intel-core-i7-3770-performance
Intel Core i7-3770 testing with a Dell 0NW73C (A11 BIOS) and Sapphire AMD Radeon RX 460/560D / Pro 450/455/460/555/555X/560/560X 4GB on Mageia 8 via the Phoronix Test Suite.
Sapphire AMD Radeon RX 460
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Dell 0NW73C (A11 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 8GB, Disk: 480GB KINGSTON SA400S3 + 240GB KINGSTON SA400S3 + 0GB SD/MMC + 0GB Compact Flash + 0GB SM/xD-Picture + 0GB MS/MS-Pro, Graphics: Sapphire AMD Radeon RX 460/560D / Pro 450/455/460/555/555X/560/560X 4GB (1226/1500MHz), Audio: Realtek ALC887-VD, Monitor: S240HL, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR9485
OS: Mageia 8, Kernel: 5.10.9-desktop-2.mga8 (x86_64), Desktop: KDE Plasma 5.20.4, Display Server: X Server 1.20.10, OpenGL: 4.6 Mesa 20.3.3 (LLVM 11.0.1), Compiler: Clang 11.0.1 + LLVM 11.0.1, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Intel Core i7-3770 - Sapphire AMD Radeon RX 460/560D
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Dell 0NW73C (A11 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 8GB, Disk: 480GB KINGSTON SA400S3 + 240GB KINGSTON SA400S3 + 0GB SD/MMC + 0GB Compact Flash + 0GB SM/xD-Picture + 0GB MS/MS-Pro, Graphics: Sapphire AMD Radeon RX 460/560D / Pro 450/455/460/555/555X/560/560X 4GB (1226/1500MHz), Audio: Intel 7 /C216, Monitor: S240HL, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR9485
OS: Mageia 8, Kernel: 5.10.10-desktop-1.mga8 (x86_64), Desktop: KDE Plasma 5.20.4, Display Server: X Server 1.20.10, OpenGL: 4.6 Mesa 20.3.3 (LLVM 11.0.1), Compiler: Clang 11.0.1 + LLVM 11.0.1, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Sample Pass Fail
An example test profile of handling pass/fail type testing rather than performance related. Learn more via the OpenBenchmarking.org test page.
Unpacking Firefox
This simple test profile measures how long it takes to extract the .tar.xz source package of the Mozilla Firefox Web Browser. Learn more via the OpenBenchmarking.org test page.
Sapphire AMD Radeon RX 460
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Dell 0NW73C (A11 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 8GB, Disk: 480GB KINGSTON SA400S3 + 240GB KINGSTON SA400S3 + 0GB SD/MMC + 0GB Compact Flash + 0GB SM/xD-Picture + 0GB MS/MS-Pro, Graphics: Sapphire AMD Radeon RX 460/560D / Pro 450/455/460/555/555X/560/560X 4GB (1226/1500MHz), Audio: Realtek ALC887-VD, Monitor: S240HL, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR9485
OS: Mageia 8, Kernel: 5.10.9-desktop-2.mga8 (x86_64), Desktop: KDE Plasma 5.20.4, Display Server: X Server 1.20.10, OpenGL: 4.6 Mesa 20.3.3 (LLVM 11.0.1), Compiler: Clang 11.0.1 + LLVM 11.0.1, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 21 January 2021 19:49 by user hansmicheelsen.
Intel Core i7-3770 - Sapphire AMD Radeon RX 460/560D
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Dell 0NW73C (A11 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 8GB, Disk: 480GB KINGSTON SA400S3 + 240GB KINGSTON SA400S3 + 0GB SD/MMC + 0GB Compact Flash + 0GB SM/xD-Picture + 0GB MS/MS-Pro, Graphics: Sapphire AMD Radeon RX 460/560D / Pro 450/455/460/555/555X/560/560X 4GB (1226/1500MHz), Audio: Intel 7 /C216, Monitor: S240HL, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR9485
OS: Mageia 8, Kernel: 5.10.10-desktop-1.mga8 (x86_64), Desktop: KDE Plasma 5.20.4, Display Server: X Server 1.20.10, OpenGL: 4.6 Mesa 20.3.3 (LLVM 11.0.1), Compiler: Clang 11.0.1 + LLVM 11.0.1, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 25 January 2021 12:50 by user hansmicheelsen.