core-latency_1
Intel Xeon E3-1545M v5 testing with a Dell 017JKT (1.17.0 BIOS) and Intel Iris Pro P580 8GB on openSUSE 20201024 via the Phoronix Test Suite.
core-latency_1
Processor: Intel Xeon E3-1545M v5 @ 3.80GHz (4 Cores / 8 Threads), Motherboard: Dell 017JKT (1.17.0 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 2 x 16 GB DDR4-2400MT/s, Disk: 2048GB INTEL SSDPEKNW020T8 + 1000GB KINGSTON SA2000M81000G + 1024GB Micron 1100 SATA, Graphics: Intel Iris Pro P580 8GB, Audio: Realtek ALC3254, Network: Intel I219-LM + Intel-AC 9260
OS: openSUSE 20201024, Kernel: 5.8.15-1-default (x86_64), Desktop: KDE Plasma, Display Server: X Server 1.20.9, Display Driver: modesetting 1.20.9, Vulkan: 1.2.145, Compiler: GCC 10.2.1 20200825 [revision c0746a1beb1ba073c7981eb09f55b3d993b32e5c], File-System: btrfs, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-werror --enable-cet=auto --enable-checking=release --enable-gnu-indirect-function --enable-languages=c,c++,objc,fortran,obj-c++,ada,go,d --enable-libphobos --enable-libstdcxx-allocator=new --enable-link-mutex --enable-linux-futex --enable-multilib --enable-offload-targets=nvptx-none=/usr/nvptx-none,amdgcn-amdhsa=/usr/amdgcn-amdhsa, --enable-plugin --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-build-config=bootstrap-lto-lean --with-gcc-major-version-only --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Core-Latency
This is a test of core-latency, which measures the latency between all core combinations on the system processor(s). Reported is the average latency. Learn more via the OpenBenchmarking.org test page.
core-latency_1
Processor: Intel Xeon E3-1545M v5 @ 3.80GHz (4 Cores / 8 Threads), Motherboard: Dell 017JKT (1.17.0 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 2 x 16 GB DDR4-2400MT/s, Disk: 2048GB INTEL SSDPEKNW020T8 + 1000GB KINGSTON SA2000M81000G + 1024GB Micron 1100 SATA, Graphics: Intel Iris Pro P580 8GB, Audio: Realtek ALC3254, Network: Intel I219-LM + Intel-AC 9260
OS: openSUSE 20201024, Kernel: 5.8.15-1-default (x86_64), Desktop: KDE Plasma, Display Server: X Server 1.20.9, Display Driver: modesetting 1.20.9, Vulkan: 1.2.145, Compiler: GCC 10.2.1 20200825 [revision c0746a1beb1ba073c7981eb09f55b3d993b32e5c], File-System: btrfs, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-werror --enable-cet=auto --enable-checking=release --enable-gnu-indirect-function --enable-languages=c,c++,objc,fortran,obj-c++,ada,go,d --enable-libphobos --enable-libstdcxx-allocator=new --enable-link-mutex --enable-linux-futex --enable-multilib --enable-offload-targets=nvptx-none=/usr/nvptx-none,amdgcn-amdhsa=/usr/amdgcn-amdhsa, --enable-plugin --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-build-config=bootstrap-lto-lean --with-gcc-major-version-only --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 29 October 2020 18:11 by user .