test_cpu_mitigations_disabled
Intel Core i7-6600U testing with a Dell 0T6HHJ (1.18.5 BIOS) and Intel HD 520 3GB on Arch Linux via the Phoronix Test Suite.
2020.03.15_test_cpu_mitigations_disabled
Processor: Intel Core i7-6600U @ 3.40GHz (2 Cores / 4 Threads), Motherboard: Dell 0T6HHJ (1.18.5 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 8192MB, Disk: 120GB Generic + 256GB INTEL SSDSCKGF25, Graphics: Intel HD 520 3GB (1050MHz), Audio: Intel Sunrise Point-LP HD Audio, Monitor: Acer CB281HK, Network: Intel I219-LM + Intel 8260
OS: Arch Linux, Kernel: 5.5.9-arch1-2 (x86_64), Desktop: KDE Plasma 5.18.3, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.6 Mesa 19.3.4, Compiler: GCC 9.3.0 + Clang 9.0.1 + ICC, File-System: ext4, Screen Resolution: 3840x2160
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Rodinia
Rodinia is a suite focused upon accelerating compute-intensive applications with accelerators. CUDA, OpenMP, and OpenCL parallel models are supported by the included applications. This profile utilizes the OpenCL and OpenMP test binaries at the moment. Learn more via the OpenBenchmarking.org test page.
NAMD
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
x264
This is a simple test of the x264 encoder run on the CPU (OpenCL support disabled) with a sample video file. Learn more via the OpenBenchmarking.org test page.
x265
This is a simple test of the x265 encoder run on the CPU with a sample 1080p video file. Learn more via the OpenBenchmarking.org test page.
7-Zip Compression
This is a test of 7-Zip using p7zip with its integrated benchmark feature or upstream 7-Zip for the Windows x64 build. Learn more via the OpenBenchmarking.org test page.
Stockfish
This is a test of Stockfish, an advanced C++11 chess benchmark that can scale up to 128 CPU cores. Learn more via the OpenBenchmarking.org test page.
asmFish
This is a test of asmFish, an advanced chess benchmark written in Assembly. Learn more via the OpenBenchmarking.org test page.
Timed Linux Kernel Compilation
This test times how long it takes to build the Linux kernel in a default configuration. Learn more via the OpenBenchmarking.org test page.
POV-Ray
This is a test of POV-Ray, the Persistence of Vision Raytracer. POV-Ray is used to create 3D graphics using ray-tracing. Learn more via the OpenBenchmarking.org test page.
OpenSSL
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test measures the RSA 4096-bit performance of OpenSSL. Learn more via the OpenBenchmarking.org test page.
ctx_clock
Ctx_clock is a simple test program to measure the context switch time in clock cycles. Learn more via the OpenBenchmarking.org test page.
Sysbench
This is a benchmark of Sysbench with CPU and memory sub-tests. Learn more via the OpenBenchmarking.org test page.
2020.03.15_test_cpu_mitigations_disabled
Processor: Intel Core i7-6600U @ 3.40GHz (2 Cores / 4 Threads), Motherboard: Dell 0T6HHJ (1.18.5 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 8192MB, Disk: 120GB Generic + 256GB INTEL SSDSCKGF25, Graphics: Intel HD 520 3GB (1050MHz), Audio: Intel Sunrise Point-LP HD Audio, Monitor: Acer CB281HK, Network: Intel I219-LM + Intel 8260
OS: Arch Linux, Kernel: 5.5.9-arch1-2 (x86_64), Desktop: KDE Plasma 5.18.3, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.6 Mesa 19.3.4, Compiler: GCC 9.3.0 + Clang 9.0.1 + ICC, File-System: ext4, Screen Resolution: 3840x2160
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 15 March 2020 01:07 by user iyan.