XPS13-9343-linux-test-mitigationsON
Intel Core i5-5200U testing with a Dell 0TM99H (A20 BIOS) and Intel HD 5500 3GB on ManjaroLinux 20.0.3 via the Phoronix Test Suite - mitigationsON_noSMT
XPS13-9343-niux-test-mitigationsON
Kernel Notes: i915.enable_dc=2 i915.enable_fbc=1 i915.modeset=1 i915.enable_psr=1
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2e
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
XPS13-9343-niux-test-mitigationsOFF
Processor: Intel Core i5-5200U @ 2.70GHz (2 Cores / 4 Threads), Motherboard: Dell 0TM99H (A20 BIOS), Chipset: Intel Broadwell-U-OPI, Memory: 8GB, Disk: 500GB Samsung SSD 860, Graphics: Intel HD 5500 3GB (900MHz), Audio: Intel Broadwell-U Audio, Monitor: DELL U2419HC, Network: Intel 7265
OS: ManjaroLinux 20.0.3, Kernel: 5.4.44-1-MANJARO (x86_64), Desktop: KDE Plasma 5.18.5, Display Server: X Server 1.20.8, Display Driver: intel 2.99.917, OpenGL: 4.6 Mesa 20.0.7, Compiler: GCC 10.1.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: i915.enable_dc=2 i915.enable_fbc=1 i915.modeset=1 i915.enable_psr=1
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2e
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected
XPS13-9343-niux-test-mitigationsON_noSMT
Changed Processor to Intel Core i5-5200U @ 2.70GHz (2 Cores).
Security Change: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW RSB filling + tsx_async_abort: Not affected
Sysbench
This is a benchmark of Sysbench with CPU and memory sub-tests. Learn more via the OpenBenchmarking.org test page.
x264
This is a simple test of the x264 encoder run on the CPU (OpenCL support disabled) with a sample video file. Learn more via the OpenBenchmarking.org test page.
x265
This is a simple test of the x265 encoder run on the CPU with a sample 1080p video file. Learn more via the OpenBenchmarking.org test page.
Stockfish
This is a test of Stockfish, an advanced C++11 chess benchmark that can scale up to 128 CPU cores. Learn more via the OpenBenchmarking.org test page.
asmFish
This is a test of asmFish, an advanced chess benchmark written in Assembly. Learn more via the OpenBenchmarking.org test page.
OpenSSL
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test measures the RSA 4096-bit performance of OpenSSL. Learn more via the OpenBenchmarking.org test page.
ctx_clock
Ctx_clock is a simple test program to measure the context switch time in clock cycles. Learn more via the OpenBenchmarking.org test page.
NAMD
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
Rodinia
Rodinia is a suite focused upon accelerating compute-intensive applications with accelerators. CUDA, OpenMP, and OpenCL parallel models are supported by the included applications. This profile utilizes the OpenCL and OpenMP test binaries at the moment. Learn more via the OpenBenchmarking.org test page.
POV-Ray
This is a test of POV-Ray, the Persistence of Vision Raytracer. POV-Ray is used to create 3D graphics using ray-tracing. Learn more via the OpenBenchmarking.org test page.
XPS13-9343-niux-test-mitigationsON
Kernel Notes: i915.enable_dc=2 i915.enable_fbc=1 i915.modeset=1 i915.enable_psr=1
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2e
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 15 July 2020 14:06 by user sem.
XPS13-9343-niux-test-mitigationsOFF
Processor: Intel Core i5-5200U @ 2.70GHz (2 Cores / 4 Threads), Motherboard: Dell 0TM99H (A20 BIOS), Chipset: Intel Broadwell-U-OPI, Memory: 8GB, Disk: 500GB Samsung SSD 860, Graphics: Intel HD 5500 3GB (900MHz), Audio: Intel Broadwell-U Audio, Monitor: DELL U2419HC, Network: Intel 7265
OS: ManjaroLinux 20.0.3, Kernel: 5.4.44-1-MANJARO (x86_64), Desktop: KDE Plasma 5.18.5, Display Server: X Server 1.20.8, Display Driver: intel 2.99.917, OpenGL: 4.6 Mesa 20.0.7, Compiler: GCC 10.1.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: i915.enable_dc=2 i915.enable_fbc=1 i915.modeset=1 i915.enable_psr=1
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2e
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected
Testing initiated at 15 July 2020 22:07 by user sem.
XPS13-9343-niux-test-mitigationsON_noSMT
Processor: Intel Core i5-5200U @ 2.70GHz (2 Cores), Motherboard: Dell 0TM99H (A20 BIOS), Chipset: Intel Broadwell-U-OPI, Memory: 8GB, Disk: 500GB Samsung SSD 860, Graphics: Intel HD 5500 3GB (900MHz), Audio: Intel Broadwell-U Audio, Monitor: DELL U2419HC, Network: Intel 7265
OS: ManjaroLinux 20.0.3, Kernel: 5.4.44-1-MANJARO (x86_64), Desktop: KDE Plasma 5.18.5, Display Server: X Server 1.20.8, Display Driver: intel 2.99.917, OpenGL: 4.6 Mesa 20.0.7, Compiler: GCC 10.1.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: i915.enable_dc=2 i915.enable_fbc=1 i915.modeset=1 i915.enable_psr=1
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2e
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW RSB filling + tsx_async_abort: Not affected
Testing initiated at 16 July 2020 11:57 by user sem.