20210324-finance
Intel Core i7-5775C testing with a ASUS Z97I-PLUS (2704 BIOS) and ASUS Intel Iris Pro 6200 on Ubuntu 20.04 via the Phoronix Test Suite.
i7 5775C
Processor: Intel Core i7-5775C @ 3.70GHz (4 Cores / 8 Threads), Motherboard: ASUS Z97I-PLUS (2704 BIOS), Chipset: Intel Broadwell-U DMI, Memory: 2 x 4096 MB DDR3-2133MT/s Kingston KHX1866C10D3, Disk: 128GB FCCT128M4SSD1, Graphics: ASUS Intel Iris Pro 6200 (1150MHz), Audio: Intel Broadwell-U Audio, Monitor: iScan Duo, Network: Intel I218-V
OS: Ubuntu 20.04, Kernel: 5.4.0-67-generic (x86_64), OpenCL: OpenCL 2.0 beignet 1.3, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-HskZEa/gcc-9-9.3.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x22 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Vulnerable
FinanceBench
FinanceBench is a collection of financial program benchmarks with support for benchmarking on the GPU via OpenCL and CPU benchmarking with OpenMP. The FinanceBench test cases are focused on Black-Sholes-Merton Process with Analytic European Option engine, QMC (Sobol) Monte-Carlo method (Equity Option Example), Bonds Fixed-rate bond with flat forward curve, and Repo Securities repurchase agreement. FinanceBench was originally written by the Cavazos Lab at University of Delaware. Learn more via the OpenBenchmarking.org test page.
i7 5775C
Processor: Intel Core i7-5775C @ 3.70GHz (4 Cores / 8 Threads), Motherboard: ASUS Z97I-PLUS (2704 BIOS), Chipset: Intel Broadwell-U DMI, Memory: 2 x 4096 MB DDR3-2133MT/s Kingston KHX1866C10D3, Disk: 128GB FCCT128M4SSD1, Graphics: ASUS Intel Iris Pro 6200 (1150MHz), Audio: Intel Broadwell-U Audio, Monitor: iScan Duo, Network: Intel I218-V
OS: Ubuntu 20.04, Kernel: 5.4.0-67-generic (x86_64), OpenCL: OpenCL 2.0 beignet 1.3, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-HskZEa/gcc-9-9.3.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x22 - Thermald 1.9.1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Vulnerable
Testing initiated at 24 March 2021 08:58 by user root.