~/pts-network-results
Intel Core i7-6560U testing with a HP 81CB (F.25 BIOS) and Intel Iris 540 3GB on Fedora 33 via the Phoronix Test Suite.
network results of pts network
Processor: Intel Core i7-6560U @ 3.20GHz (2 Cores / 4 Threads), Motherboard: HP 81CB (F.25 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16384MB, Disk: 1000GB KINGSTON SA2000M81000G, Graphics: Intel Iris 540 3GB (1050MHz), Audio: Conexant CX8200, Network: Intel 7265
OS: Fedora 33, Kernel: 5.9.8-200.fc33.x86_64 (x86_64), Desktop: GNOME Shell 3.38.1, Display Server: X Server 1.20.4 + Wayland, Display Driver: modesetting 1.20.4, OpenGL: 4.6 Mesa 20.2.2, Compiler: GCC 10.2.1 20201016 +, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Sockperf
This is a network socket API performance benchmark. Learn more via the OpenBenchmarking.org test page.
Ethr
Ethr is a cross-platform Golang-written network performance measurement tool developed by Microsoft that is capable of testing multiple protocols and different measurements. Learn more via the OpenBenchmarking.org test page.
network results of pts network
Processor: Intel Core i7-6560U @ 3.20GHz (2 Cores / 4 Threads), Motherboard: HP 81CB (F.25 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16384MB, Disk: 1000GB KINGSTON SA2000M81000G, Graphics: Intel Iris 540 3GB (1050MHz), Audio: Conexant CX8200, Network: Intel 7265
OS: Fedora 33, Kernel: 5.9.8-200.fc33.x86_64 (x86_64), Desktop: GNOME Shell 3.38.1, Display Server: X Server 1.20.4 + Wayland, Display Driver: modesetting 1.20.4, OpenGL: 4.6 Mesa 20.2.2, Compiler: GCC 10.2.1 20201016 +, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 21 November 2020 13:17 by user trev.