y500 kernel benchmark
Intel Core i5-3210M testing with a LENOVO (6BCN44WWV2.04 BIOS) and NVIDIA GeForce GT 650M 2GB on Arch rolling via the Phoronix Test Suite.
y500 5.6.8-arch1-1
Processor: Intel Core i5-3210M @ 3.10GHz (2 Cores / 4 Threads), Motherboard: LENOVO (6BCN44WWV2.04 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 1000GB CT1000MX500SSD1, Graphics: NVIDIA GeForce GT 650M 2GB, Audio: Realtek ALC269VC, Network: Qualcomm Atheros AR8161 + Intel Centrino-N 2230
OS: Arch rolling, Kernel: 5.6.8-arch1-1 (x86_64), Desktop: KDE Plasma 5.18.4, Display Server: X Server 1.20.8, Display Driver: NVIDIA 440.82, OpenGL: 4.6.0, Compiler: GCC 9.3.0 + Clang 10.0.0 + CUDA 10.2, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x15
Java Notes: OpenJDK Runtime Environment (build 11.0.6+10)
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + tsx_async_abort: Not affected
Java SciMark
This test runs the Java version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This benchmark is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
Timed ImageMagick Compilation
This test times how long it takes to build ImageMagick. Learn more via the OpenBenchmarking.org test page.
Unigine Heaven
This test calculates the average frame-rate within the Heaven demo for the Unigine engine. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
y500 5.6.8-arch1-1
Processor: Intel Core i5-3210M @ 3.10GHz (2 Cores / 4 Threads), Motherboard: LENOVO (6BCN44WWV2.04 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 1000GB CT1000MX500SSD1, Graphics: NVIDIA GeForce GT 650M 2GB, Audio: Realtek ALC269VC, Network: Qualcomm Atheros AR8161 + Intel Centrino-N 2230
OS: Arch rolling, Kernel: 5.6.8-arch1-1 (x86_64), Desktop: KDE Plasma 5.18.4, Display Server: X Server 1.20.8, Display Driver: NVIDIA 440.82, OpenGL: 4.6.0, Compiler: GCC 9.3.0 + Clang 10.0.0 + CUDA 10.2, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x15
Java Notes: OpenJDK Runtime Environment (build 11.0.6+10)
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + tsx_async_abort: Not affected
Testing initiated at 2 May 2020 20:39 by user kjawo.