ivyresult
Intel Core i7-3770 testing on Gentoo 2.13 via the Phoronix Test Suite.
ivy_result
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/9.3.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0 --disable-esp --disable-fixed-point --disable-libada --disable-libssp --disable-multilib --disable-nls --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/9.3.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/man --with-multilib-list=m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/python --without-isl
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x12
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Intel Core i5-3470 - Gigabyte Intel HD 2500 2GB -
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x12
Python Notes: Python 3.8.5
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Intel Core i5-3470
Processor: Intel Core i5-3470 @ 3.60GHz (4 Cores), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 16GB, Disk: 128GB PLEXTOR PX-128M5 + 1000GB HGST HTS721010A9, Graphics: Gigabyte Intel HD 2500 2GB (1100MHz), Audio: Realtek ALC892, Monitor: B24W-7 LED, Network: 2 x Realtek RTL8111/8168/8411 + Intel Centrino-N 2230
OS: Gentoo 2.7, Kernel: 4.14.202-gentoo (x86_64), Desktop: Xfce 4.14, Display Server: X Server 1.20.8, OpenGL: 4.2 Mesa 20.1.10, Compiler: GCC 9.3.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 1920x1200
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/9.3.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0 --disable-esp --disable-fixed-point --disable-libada --disable-libssp --disable-multilib --disable-nls --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/9.3.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/man --with-multilib-list=m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/python --without-isl
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x12
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
2023-06-04T0033
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 16GB, Disk: 128GB PLEXTOR PX-128M5 + 3 x 1000GB HGST HTS721010A9, Graphics: Gigabyte Intel HD 4000 IVB GT2 2GB (1150MHz), Audio: Realtek ALC892, Monitor: B24W-7 LED, Network: 2 x Realtek RTL8111/8168/8411 + Intel Centrino-N 2230
OS: Gentoo 2.13, Kernel: 5.15.114-gentoo (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.8, OpenGL: 4.2 Mesa 23.0.3, Compiler: GCC 12.2.1 20230428 + Clang 15.0.7 + LLVM 15.0.7, File-System: ext4, Screen Resolution: 1920x1200
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/12 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/12 --disable-cet --disable-esp --disable-fixed-point --disable-libada --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-libvtv --disable-multilib --disable-nls --disable-systemtap --disable-valgrind-annotations --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/12/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/12/man --with-gcc-major-version-only --with-multilib-list=m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/12/python --without-isl --without-zstd
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x12
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
TSCP
This is a performance test of TSCP, Tom Kerrigan's Simple Chess Program, which has a built-in performance benchmark. Learn more via the OpenBenchmarking.org test page.
Crafty
This is a performance test of Crafty, an advanced open-source chess engine. Learn more via the OpenBenchmarking.org test page.
FLAC Audio Encoding
This test times how long it takes to encode a sample WAV file to FLAC format five times. Learn more via the OpenBenchmarking.org test page.
Tesseract OCR
Tesseract-OCR is the open-source optical character recognition (OCR) engine for the conversion of text within images to raw text output. This test profile relies upon a system-supplied Tesseract installation. Learn more via the OpenBenchmarking.org test page.
N-Queens
This is a test of the OpenMP version of a test that solves the N-queens problem. The board problem size is 18. Learn more via the OpenBenchmarking.org test page.
Stockfish
This is a test of Stockfish, an advanced C++11 chess benchmark that can scale up to 128 CPU cores. Learn more via the OpenBenchmarking.org test page.
asmFish
This is a test of asmFish, an advanced chess benchmark written in Assembly. Learn more via the OpenBenchmarking.org test page.
m-queens
A solver for the N-queens problem with multi-threading support via the OpenMP library. Learn more via the OpenBenchmarking.org test page.
x264
This is a simple test of the x264 encoder run on the CPU (OpenCL support disabled) with a sample video file. Learn more via the OpenBenchmarking.org test page.
ivy_result
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/9.3.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0 --disable-esp --disable-fixed-point --disable-libada --disable-libssp --disable-multilib --disable-nls --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/9.3.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/man --with-multilib-list=m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/python --without-isl
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x12
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 17 November 2020 01:21 by user andreas.
Intel Core i5-3470 - Gigabyte Intel HD 2500 2GB -
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x12
Python Notes: Python 3.8.5
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 17 November 2020 01:28 by user andreas.
Intel Core i5-3470
Processor: Intel Core i5-3470 @ 3.60GHz (4 Cores), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 16GB, Disk: 128GB PLEXTOR PX-128M5 + 1000GB HGST HTS721010A9, Graphics: Gigabyte Intel HD 2500 2GB (1100MHz), Audio: Realtek ALC892, Monitor: B24W-7 LED, Network: 2 x Realtek RTL8111/8168/8411 + Intel Centrino-N 2230
OS: Gentoo 2.7, Kernel: 4.14.202-gentoo (x86_64), Desktop: Xfce 4.14, Display Server: X Server 1.20.8, OpenGL: 4.2 Mesa 20.1.10, Compiler: GCC 9.3.0 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 1920x1200
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/9.3.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0 --disable-esp --disable-fixed-point --disable-libada --disable-libssp --disable-multilib --disable-nls --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/9.3.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/man --with-multilib-list=m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/python --without-isl
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x12
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 17 November 2020 01:35 by user andreas.
2023-06-04T0033
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 16GB, Disk: 128GB PLEXTOR PX-128M5 + 3 x 1000GB HGST HTS721010A9, Graphics: Gigabyte Intel HD 4000 IVB GT2 2GB (1150MHz), Audio: Realtek ALC892, Monitor: B24W-7 LED, Network: 2 x Realtek RTL8111/8168/8411 + Intel Centrino-N 2230
OS: Gentoo 2.13, Kernel: 5.15.114-gentoo (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.8, OpenGL: 4.2 Mesa 23.0.3, Compiler: GCC 12.2.1 20230428 + Clang 15.0.7 + LLVM 15.0.7, File-System: ext4, Screen Resolution: 1920x1200
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/12 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/12 --disable-cet --disable-esp --disable-fixed-point --disable-libada --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-libvtv --disable-multilib --disable-nls --disable-systemtap --disable-valgrind-annotations --disable-vtable-verify --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/12/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/12/man --with-gcc-major-version-only --with-multilib-list=m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/12/python --without-isl --without-zstd
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x12
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 4 June 2023 00:34 by user andreas.