nuc-tfl
Intel Core i3-3217U testing with a Intel D33217GKE (GKPPT10H.86A.0047.2013.1118.1714 BIOS) and Intel 3rd Gen Core on Debian 10 via the Phoronix Test Suite.
Intel Core i3-3217U - Intel 3rd Gen Core - Intel
Processor: Intel Core i3-3217U @ 1.70GHz (2 Cores / 4 Threads), Motherboard: Intel D33217GKE (GKPPT10H.86A.0047.2013.1118.1714 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 30GB SATA SSD, Graphics: Intel 3rd Gen Core (1050MHz), Audio: Intel 7 /C216, Monitor: BenQ GL2450, Network: Intel 82579V
OS: Debian 10, Kernel: 4.19.0-16-amd64 (x86_64), File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x19
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
TensorFlow Lite
This is a benchmark of the TensorFlow Lite implementation. The current Linux support is limited to running on CPUs. This test profile is measuring the average inference time. Learn more via the OpenBenchmarking.org test page.
Intel Core i3-3217U - Intel 3rd Gen Core - Intel
Processor: Intel Core i3-3217U @ 1.70GHz (2 Cores / 4 Threads), Motherboard: Intel D33217GKE (GKPPT10H.86A.0047.2013.1118.1714 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 30GB SATA SSD, Graphics: Intel 3rd Gen Core (1050MHz), Audio: Intel 7 /C216, Monitor: BenQ GL2450, Network: Intel 82579V
OS: Debian 10, Kernel: 4.19.0-16-amd64 (x86_64), File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x19
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 8 April 2021 10:18 by user stuart.