proctests
Intel Core i7-2600K testing with a ASUS P8Z68-V PRO GEN3 (3402 BIOS) and ASUS NVIDIA GeForce GTX 750 Ti 2GB on LinuxMint 19.2 via the Phoronix Test Suite.
intel
Processor: Intel Core i7-2600K @ 5.90GHz (4 Cores / 8 Threads), Motherboard: ASUS P8Z68-V PRO GEN3 (3402 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 24576MB, Disk: 256GB SAMSUNG SSD 830 + 480GB SanDisk SSD PLUS + 1000GB SAMSUNG HD103SJ + 2000GB Seagate ST2000LM003 HN-M, Graphics: ASUS NVIDIA GeForce GTX 750 Ti 2GB (1071/2700MHz), Audio: Realtek ALC892, Monitor: LA1951 + DELL P1913S, Network: Intel 82579V
OS: LinuxMint 19.2, Kernel: 4.15.0-54-generic (x86_64), Desktop: Cinnamon 4.2.3, Display Server: X Server 1.19.6, Display Driver: NVIDIA 435.21, OpenGL: 4.6.0, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 5520x1050
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x26
OpenCL Notes: GPU Compute Cores: 640
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Rodinia
Rodinia is a suite focused upon accelerating compute-intensive applications with accelerators. CUDA, OpenMP, and OpenCL parallel models are supported by the included applications. This profile utilizes the OpenCL and OpenMP test binaries at the moment. Learn more via the OpenBenchmarking.org test page.
intel
Processor: Intel Core i7-2600K @ 5.90GHz (4 Cores / 8 Threads), Motherboard: ASUS P8Z68-V PRO GEN3 (3402 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 24576MB, Disk: 256GB SAMSUNG SSD 830 + 480GB SanDisk SSD PLUS + 1000GB SAMSUNG HD103SJ + 2000GB Seagate ST2000LM003 HN-M, Graphics: ASUS NVIDIA GeForce GTX 750 Ti 2GB (1071/2700MHz), Audio: Realtek ALC892, Monitor: LA1951 + DELL P1913S, Network: Intel 82579V
OS: LinuxMint 19.2, Kernel: 4.15.0-54-generic (x86_64), Desktop: Cinnamon 4.2.3, Display Server: X Server 1.19.6, Display Driver: NVIDIA 435.21, OpenGL: 4.6.0, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 5520x1050
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x26
OpenCL Notes: GPU Compute Cores: 640
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 5 January 2020 22:42 by user kid.