Various open-source benchmarks by the Phoronix Test Suite v9.0.1 (Asker).
Processor: Intel Core i7-6820HQ @ 3.60GHz (4 Cores / 8 Threads), Motherboard: Dell Latitude E5470 (1.22.3 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 32768MB, Disk: 1000GB Samsung SSD 840, Graphics: Intel HD 530 3GB (1050MHz), Audio: Realtek ALC3235, Network: Intel I219-LM + Intel 8260
OS: Fedora 33, Kernel: 5.8.14-300.fc33.x86_64 (x86_64), Desktop: GNOME Shell 3.38.1, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 20.2.1, Compiler: GCC 10.2.1 20201005, File-System: btrfs, Screen Resolution: 1600x900
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate powersave
Java Notes: OpenJDK Runtime Environment 18.9 (build 11.0.9-ea+10)
Python Notes: Python 3.9.0
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
This test runs a series of automated performance/quality sub-tests that exercise the OpenGL-based Java 2D pipeline in order to verify the quality of OpenGL drivers. Learn more via the OpenBenchmarking.org test page.
OpenVKL is the Intel Open Volume Kernel Library that offers high-performance volume computation kernels and part of the Intel oneAPI rendering toolkit. Learn more via the OpenBenchmarking.org test page.
This is a test of rays1bench, a simple path-tracer / ray-tracing that supports SSE and AVX instructions, multi-threading, and other features. This test profile is measuring the performance of the "large scene" in rays1bench. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-6820HQ @ 3.60GHz (4 Cores / 8 Threads), Motherboard: Dell Latitude E5470 (1.22.3 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 32768MB, Disk: 1000GB Samsung SSD 840, Graphics: Intel HD 530 3GB (1050MHz), Audio: Realtek ALC3235, Network: Intel I219-LM + Intel 8260
OS: Fedora 33, Kernel: 5.8.14-300.fc33.x86_64 (x86_64), Desktop: GNOME Shell 3.38.1, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 20.2.1, Compiler: GCC 10.2.1 20201005, File-System: btrfs, Screen Resolution: 1600x900
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate powersave
Java Notes: OpenJDK Runtime Environment 18.9 (build 11.0.9-ea+10)
Python Notes: Python 3.9.0
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 16 October 2020 12:24 by user skoll.