Thinkpad L14 - i7-10510U / 24GB RAM / Ubuntu 20.04 migitaions disabled and performance applied on kernel 5.8.4
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Java Notes: OpenJDK Runtime Environment (build 11.0.8+10-post-Ubuntu-0ubuntu120.04)
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Mitigation of TSX disabled + tsx_async_abort: Not affected
Processor: Intel Core i7-10510U @ 4.90GHz (4 Cores / 8 Threads), Motherboard: LENOVO 20U10016UK (R17ET19W 1.02 BIOS), Chipset: Intel Device 02ef, Memory: 8192 MB + 16384 MB DDR4-2400MT/s, Disk: 512GB Western Digital PC SN730 SDBQNTY-512G-1001, Graphics: Intel UHD (1150MHz), Audio: Realtek ALC257, Network: Intel + Intel Wi-Fi 6 AX200
OS: Ubuntu 20.04, Kernel: 5.4.0-42-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xd6
Java Notes: OpenJDK Runtime Environment (build 11.0.8+10-post-Ubuntu-0ubuntu120.04)
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Mitigation of TSX disabled + tsx_async_abort: Not affected
OS: Ubuntu 20.04, Kernel: 5.8.5-050805-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xd6
Java Notes: OpenJDK Runtime Environment (build 11.0.8+10-post-Ubuntu-0ubuntu120.04)
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Mitigation of TSX disabled + tsx_async_abort: Not affected
This test runs the Java version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This benchmark is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Java Notes: OpenJDK Runtime Environment (build 11.0.8+10-post-Ubuntu-0ubuntu120.04)
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Mitigation of TSX disabled + tsx_async_abort: Not affected
Testing initiated at 27 August 2020 15:25 by user root.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Java Notes: OpenJDK Runtime Environment (build 11.0.8+10-post-Ubuntu-0ubuntu120.04)
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Mitigation of TSX disabled + tsx_async_abort: Not affected
Testing initiated at 27 August 2020 15:30 by user root.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Java Notes: OpenJDK Runtime Environment (build 11.0.8+10-post-Ubuntu-0ubuntu120.04)
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Mitigation of TSX disabled + tsx_async_abort: Not affected
Testing initiated at 27 August 2020 15:35 by user root.
Processor: Intel Core i7-10510U @ 4.90GHz (4 Cores / 8 Threads), Motherboard: LENOVO 20U10016UK (R17ET19W 1.02 BIOS), Chipset: Intel Device 02ef, Memory: 8192 MB + 16384 MB DDR4-2400MT/s, Disk: 512GB Western Digital PC SN730 SDBQNTY-512G-1001, Graphics: Intel UHD (1150MHz), Audio: Realtek ALC257, Network: Intel + Intel Wi-Fi 6 AX200
OS: Ubuntu 20.04, Kernel: 5.4.0-42-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xd6
Java Notes: OpenJDK Runtime Environment (build 11.0.8+10-post-Ubuntu-0ubuntu120.04)
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Mitigation of TSX disabled + tsx_async_abort: Not affected
Testing initiated at 28 August 2020 11:08 by user root.
Processor: Intel Core i7-10510U @ 4.90GHz (4 Cores / 8 Threads), Motherboard: LENOVO 20U10016UK (R17ET19W 1.02 BIOS), Chipset: Intel Device 02ef, Memory: 8192 MB + 16384 MB DDR4-2400MT/s, Disk: 512GB Western Digital PC SN730 SDBQNTY-512G-1001, Graphics: Intel UHD (1150MHz), Audio: Realtek ALC257, Network: Intel + Intel Wi-Fi 6 AX200
OS: Ubuntu 20.04, Kernel: 5.8.5-050805-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xd6
Java Notes: OpenJDK Runtime Environment (build 11.0.8+10-post-Ubuntu-0ubuntu120.04)
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Mitigation of TSX disabled + tsx_async_abort: Not affected
Testing initiated at 28 August 2020 13:45 by user root.