6700hq_1060
Intel Core i7-6700HQ testing with a Notebook P65xRP (1.05.08LS2 BIOS) and NVIDIA GeForce GTX 1060 6GB on Gentoo 2.7 via the Phoronix Test Suite.
6700hq_1060_1
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xa6
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
6700hq_1060_unigine_1
6700hq_1060_vulkan_1
Processor: Intel Core i7-6700HQ @ 3.50GHz (4 Cores / 8 Threads), Motherboard: Notebook P65xRP (1.05.08LS2 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: 256GB SanDisk SD8SN8U2 + 1000GB HGST HTS721010A9, Graphics: NVIDIA GeForce GTX 1060 6GB (1404/4006MHz), Audio: Realtek ALC892, Network: Realtek RTL8111/8168/8411 + Intel 8260
OS: Gentoo 2.7, Kernel: 5.7.10-gentoo (x86_64), Desktop: KDE Plasma 5.19.3, Display Server: X Server 1.20.8, Display Driver: NVIDIA 450.57, OpenGL: 4.6.0, Compiler: GCC 10.2.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/10.2.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/10.2.0 --disable-esp --disable-fixed-point --disable-libada --disable-libmudflap --disable-libssp --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/10.2.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/10.2.0/man --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/10.2.0/python --without-isl --without-zstd
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xa6
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Unigine Heaven
This test calculates the average frame-rate within the Heaven demo for the Unigine engine. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Unigine Sanctuary
This test calculates the average frame-rate within the Sanctuary demo for the Unigine engine. This engine is very demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Unigine Tropics
This test calculates the average frame-rate within the Tropics / Islands demo for the Unigine engine. This engine is very demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Unigine Valley
This test calculates the average frame-rate within the Valley demo for the Unigine engine, released in February 2013. This engine is extremely demanding on the system's graphics card. Unigine Valley relies upon an OpenGL 3 core profile context. Learn more via the OpenBenchmarking.org test page.
RealSR-NCNN
RealSR-NCNN is an NCNN neural network implementation of the RealSR project and accelerated using the Vulkan API. RealSR is the Real-World Super Resolution via Kernel Estimation and Noise Injection. NCNN is a high performance neural network inference framework optimized for mobile and other platforms developed by Tencent. This test profile times how long it takes to increase the resolution of a sample image by a scale of 4x with Vulkan. Learn more via the OpenBenchmarking.org test page.
Waifu2x-NCNN Vulkan
Waifu2x-NCNN is an NCNN neural network implementation of the Waifu2x converter project and accelerated using the Vulkan API. NCNN is a high performance neural network inference framework optimized for mobile and other platforms developed by Tencent. This test profile times how long it takes to increase the resolution of a sample image with Vulkan. Learn more via the OpenBenchmarking.org test page.
6700hq_1060_1
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xa6
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 22 November 2020 14:29 by user cfrye.
6700hq_1060_unigine_1
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xa6
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 22 November 2020 20:37 by user cfrye.
6700hq_1060_vulkan_1
Processor: Intel Core i7-6700HQ @ 3.50GHz (4 Cores / 8 Threads), Motherboard: Notebook P65xRP (1.05.08LS2 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: 256GB SanDisk SD8SN8U2 + 1000GB HGST HTS721010A9, Graphics: NVIDIA GeForce GTX 1060 6GB (1404/4006MHz), Audio: Realtek ALC892, Network: Realtek RTL8111/8168/8411 + Intel 8260
OS: Gentoo 2.7, Kernel: 5.7.10-gentoo (x86_64), Desktop: KDE Plasma 5.19.3, Display Server: X Server 1.20.8, Display Driver: NVIDIA 450.57, OpenGL: 4.6.0, Compiler: GCC 10.2.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/10.2.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/10.2.0 --disable-esp --disable-fixed-point --disable-libada --disable-libmudflap --disable-libssp --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/10.2.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/10.2.0/man --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/10.2.0/python --without-isl --without-zstd
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xa6
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 22 November 2020 21:22 by user cfrye.