irkut-pts/y-cruncher-20191120
Intel Core i7-7600U testing with a LENOVO 20HQ0021UK (N1MET57W 1.42 BIOS) and Intel HD 620 on Arch Linux via the Phoronix Test Suite.
irkut-pts/y-cruncher-20191120
Processor: Intel Core i7-7600U @ 3.90GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20HQ0021UK (N1MET57W 1.42 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 16384MB, Disk: 512GB SAMSUNG MZVLW512HMJP-000L7, Graphics: Intel HD 620 (1150MHz), Audio: Conexant CX8200, Network: Intel I219-LM + Intel 8265 / 8275
OS: Arch Linux, Kernel: 5.3.10-arch1-1 (x86_64), Display Server: X Server 1.20.5, Display Driver: intel 2.99.917, Compiler: GCC 9.2.0 + Clang 9.0.0 + LLVM 9.0.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Y-Cruncher
Y-Cruncher is a multi-threaded Pi benchmark. Learn more via the OpenBenchmarking.org test page.
irkut-pts/y-cruncher-20191120
Processor: Intel Core i7-7600U @ 3.90GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20HQ0021UK (N1MET57W 1.42 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 16384MB, Disk: 512GB SAMSUNG MZVLW512HMJP-000L7, Graphics: Intel HD 620 (1150MHz), Audio: Conexant CX8200, Network: Intel I219-LM + Intel 8265 / 8275
OS: Arch Linux, Kernel: 5.3.10-arch1-1 (x86_64), Display Server: X Server 1.20.5, Display Driver: intel 2.99.917, Compiler: GCC 9.2.0 + Clang 9.0.0 + LLVM 9.0.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 20 November 2019 17:40 by user naumov.