CacheBenchArch
Intel Core i7-3770 testing with a HP 3396 (K01 v02.05 BIOS) and NVIDIA NVC1 1GB on Arch rolling via the Phoronix Test Suite.
Testing Arch Memory
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: HP 3396 (K01 v02.05 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 8GB, Disk: 240GB KINGSTON SA400S3 + 1000GB Seagate ST31000524AS, Graphics: NVIDIA NVC1 1GB, Audio: Realtek ALC221, Monitor: VG240Y, Network: Intel 82579LM
OS: Arch rolling, Kernel: 5.11.7-zen1-1-zen (x86_64), Display Server: X Server 1.20.10, Display Driver: nouveau, OpenGL: 4.3 Mesa 20.3.4, Compiler: GCC 10.2.0 + Clang 11.1.0 + LLVM 11.1.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x12
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
CacheBench
This is a performance test of CacheBench, which is part of LLCbench. CacheBench is designed to test the memory and cache bandwidth performance Learn more via the OpenBenchmarking.org test page.
Testing Arch Memory
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: HP 3396 (K01 v02.05 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 8GB, Disk: 240GB KINGSTON SA400S3 + 1000GB Seagate ST31000524AS, Graphics: NVIDIA NVC1 1GB, Audio: Realtek ALC221, Monitor: VG240Y, Network: Intel 82579LM
OS: Arch rolling, Kernel: 5.11.7-zen1-1-zen (x86_64), Display Server: X Server 1.20.10, Display Driver: nouveau, OpenGL: 4.3 Mesa 20.3.4, Compiler: GCC 10.2.0 + Clang 11.1.0 + LLVM 11.1.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x12
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 19 March 2021 16:21 by user nicola.