Intel Core i7-6600U testing with a LENOVO 20FH002JUS (N1KET37W 1.24 BIOS) and Intel Skylake GT2 [HD 520] 3GB on ManjaroLinux 20.0.3 via the Phoronix Test Suite.
Processor: Intel Core i7-6600U @ 3.40GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20FH002JUS (N1KET37W 1.24 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: 512GB SAMSUNG MZ7LN512, Graphics: Intel Skylake GT2 [HD 520] 3GB (1050MHz), Audio: Realtek ALC293, Network: Intel I219-LM + Intel 8260
OS: ManjaroLinux 20.0.3, Kernel: 5.5.19-1-MANJARO (x86_64), Display Server: X Server 1.20.8, Display Driver: intel 2.99.917, OpenGL: 4.6 Mesa 20.0.7, Compiler: GCC 10.1.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 2880x1620
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
OS: ManjaroLinux 20.0.3, Kernel: 5.6.15-1-MANJARO (x86_64), Display Server: X Server 1.20.8, Display Driver: intel 2.99.917, OpenGL: 4.6 Mesa 20.0.7, Compiler: GCC 10.1.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 2880x1620
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
GEGL is the Generic Graphics Library and is the library/framework used by GIMP and other applications like GNOME Photos. This test profile times how long it takes to complete various GEGL operations on a static set of sample JPEG images. Learn more via the OpenBenchmarking.org test page.
GIMP is an open-source image manipulaton program. This test profile will use the system-provided GIMP program otherwise on Windows relys upon a pre-packaged Windows binary from upstream GIMP.org. Learn more via the OpenBenchmarking.org test page.
This test profile measures how long it takes to complete several reference GNU Octave files via octave-benchmark. GNU Octave is used for numerical computations and is an open-source alternative to MATLAB. Learn more via the OpenBenchmarking.org test page.
Various benchmarking operations with the LibreOffice open-source office suite. Learn more via the OpenBenchmarking.org test page.
RSVG/librsvg is an SVG vector graphics library. This test profile times how long it takes to complete various operations by rsvg-convert. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-6600U @ 3.40GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20FH002JUS (N1KET37W 1.24 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: 512GB SAMSUNG MZ7LN512, Graphics: Intel Skylake GT2 [HD 520] 3GB (1050MHz), Audio: Realtek ALC293, Network: Intel I219-LM + Intel 8260
OS: ManjaroLinux 20.0.3, Kernel: 5.5.19-1-MANJARO (x86_64), Display Server: X Server 1.20.8, Display Driver: intel 2.99.917, OpenGL: 4.6 Mesa 20.0.7, Compiler: GCC 10.1.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 2880x1620
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 12 June 2020 13:00 by user jyates.
Processor: Intel Core i7-6600U @ 3.40GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20FH002JUS (N1KET37W 1.24 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: 512GB SAMSUNG MZ7LN512, Graphics: Intel Skylake GT2 [HD 520] 3GB (1050MHz), Audio: Realtek ALC293, Network: Intel I219-LM + Intel 8260
OS: ManjaroLinux 20.0.3, Kernel: 5.6.15-1-MANJARO (x86_64), Display Server: X Server 1.20.8, Display Driver: intel 2.99.917, OpenGL: 4.6 Mesa 20.0.7, Compiler: GCC 10.1.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 2880x1620
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 12 June 2020 13:53 by user jyates.