rodinia_hp-g62
Intel Core i5 460M testing with a HP 143A v60.50 (F.48 BIOS) and Intel Core IGP on Arch Linux via the Phoronix Test Suite.
rodinia_hp-g62
Processor: Intel Core i5 460M @ 2.53GHz (2 Cores / 4 Threads), Motherboard: HP 143A v60.50 (F.48 BIOS), Chipset: Intel Core DRAM, Memory: 4096MB, Disk: 320GB TOSHIBA MK3256GS + 1000GB Tech, Graphics: Intel Core IGP, Audio: Realtek ALC270, Network: Realtek RTL810xE PCI + Broadcom BCM4313 802.11bgn
OS: Arch Linux, Kernel: 6.5.3-arch1-1 (x86_64), Display Server: X Server 1.21.1.8, Compiler: GCC 13.2.1 20230801, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,objc,obj-c++ --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x7
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Rodinia
Rodinia is a suite focused upon accelerating compute-intensive applications with accelerators. CUDA, OpenMP, and OpenCL parallel models are supported by the included applications. This profile utilizes select OpenCL, NVIDIA CUDA and OpenMP test binaries at the moment. Learn more via the OpenBenchmarking.org test page.
rodinia_hp-g62
Processor: Intel Core i5 460M @ 2.53GHz (2 Cores / 4 Threads), Motherboard: HP 143A v60.50 (F.48 BIOS), Chipset: Intel Core DRAM, Memory: 4096MB, Disk: 320GB TOSHIBA MK3256GS + 1000GB Tech, Graphics: Intel Core IGP, Audio: Realtek ALC270, Network: Realtek RTL810xE PCI + Broadcom BCM4313 802.11bgn
OS: Arch Linux, Kernel: 6.5.3-arch1-1 (x86_64), Display Server: X Server 1.21.1.8, Compiler: GCC 13.2.1 20230801, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,objc,obj-c++ --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x7
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 October 2023 14:12 by user hiddenfile.