Intel Core i5-7500 testing with a Dell 0NW6H5 (1.5.2 BIOS) and Intel HD 630 3GB on Arch Linux via the Phoronix Test Suite.
Processor: Intel Core i5-7500 @ 3.80GHz (4 Cores), Motherboard: Dell 0NW6H5 (1.5.2 BIOS), Chipset: Intel Xeon E3-1200 v6/7th + Q270, Memory: 8192MB, Disk: 256GB INTEL SSDSC2KF25, Graphics: Intel HD 630 (1100MHz), Audio: Realtek ALC3234, Monitor: DELL U2412M, Network: Intel I219-LM
OS: Arch Linux, Kernel: 5.3.0-arch1-1-ARCH (x86_64), Desktop: Cinnamon 4.2.4, Display Server: X Server 1.20.5, Display Driver: intel 2.99.917, Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 1920x1200
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Processor: Intel Core i5-7500 @ 3.80GHz (4 Cores), Motherboard: Dell 0NW6H5 (1.5.2 BIOS), Chipset: Intel Xeon E3-1200 v6/7th + Q270, Memory: 8192MB, Disk: 256GB INTEL SSDSC2KF25, Graphics: Intel HD 630 3GB (1100MHz), Audio: Realtek ALC3234, Monitor: DELL U2412M, Network: Intel I219-LM
OS: Arch Linux, Kernel: 5.3.0-zen1-1-zen (x86_64), Desktop: Cinnamon 4.2.4, Display Server: X Server 1.20.5, Display Driver: intel 2.99.917, OpenGL: 4.5 Mesa 19.1.7, Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 1920x1200
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
FFTE is a package by Daisuke Takahashi to compute Discrete Fourier Transforms of 1-, 2- and 3- dimensional sequences of length (2^p)*(3^q)*(5^r). Learn more via the OpenBenchmarking.org test page.
FFTW is a C subroutine library for computing the discrete Fourier transform (DFT) in one or more dimensions. Learn more via the OpenBenchmarking.org test page.
Pennant is an application focused on hydrodynamics on general unstructured meshes in 2D. Learn more via the OpenBenchmarking.org test page.
QMCPACK is a modern high-performance open-source Quantum Monte Carlo (QMC) simulation code making use of MPI for this benchmark of the H20 example code. Learn more via the OpenBenchmarking.org test page.
This test searches through the Pfam database of profile hidden markov models. The search finds the domain structure of Drosophila Sevenless protein. Learn more via the OpenBenchmarking.org test page.
This test performs an alignment of 100 pyruvate decarboxylase sequences. Learn more via the OpenBenchmarking.org test page.
This test performs a bayesian analysis of a set of primate genome sequences in order to estimate their phylogeny. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i5-7500 @ 3.80GHz (4 Cores), Motherboard: Dell 0NW6H5 (1.5.2 BIOS), Chipset: Intel Xeon E3-1200 v6/7th + Q270, Memory: 8192MB, Disk: 256GB INTEL SSDSC2KF25, Graphics: Intel HD 630 (1100MHz), Audio: Realtek ALC3234, Monitor: DELL U2412M, Network: Intel I219-LM
OS: Arch Linux, Kernel: 5.3.0-arch1-1-ARCH (x86_64), Desktop: Cinnamon 4.2.4, Display Server: X Server 1.20.5, Display Driver: intel 2.99.917, Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 1920x1200
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 20 September 2019 03:59 by user avk.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 21 September 2019 03:16 by user avk.
Processor: Intel Core i5-7500 @ 3.80GHz (4 Cores), Motherboard: Dell 0NW6H5 (1.5.2 BIOS), Chipset: Intel Xeon E3-1200 v6/7th + Q270, Memory: 8192MB, Disk: 256GB INTEL SSDSC2KF25, Graphics: Intel HD 630 3GB (1100MHz), Audio: Realtek ALC3234, Monitor: DELL U2412M, Network: Intel I219-LM
OS: Arch Linux, Kernel: 5.3.0-zen1-1-zen (x86_64), Desktop: Cinnamon 4.2.4, Display Server: X Server 1.20.5, Display Driver: intel 2.99.917, OpenGL: 4.5 Mesa 19.1.7, Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 1920x1200
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 21 September 2019 03:18 by user avk.