LENOVO 2351BH6 (G1ETB8WW 2.78 BIOS) On Debian 10
Various open-source benchmarks by the Phoronix Test Suite v9.4.1 (Vestby).
Intel Core i5-3320M
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x20
Python Notes: Python 2.7.16 + Python 3.7.3
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Intel Ivybridge Mobile
Processor: Intel Core i5-3320M @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 2351BH6 (G1ETB8WW 2.78 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 240GB Western Digital WDS240G2G0A + 320GB 00AAKS-00B3A0, Graphics: Intel Ivybridge Mobile 2GB (1200MHz), Audio: Realtek ALC3202, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: Debian 10, Kernel: 4.19.0-18-amd64 (x86_64), Desktop: GNOME Shell 3.30.2, Display Server: X Server + Wayland, OpenGL: 4.2 Mesa 18.3.6, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1600x900
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x20
Java Notes: OpenJDK Runtime Environment (build 11.0.12+7-post-Debian-2deb10u1)
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
PolyBench-C
PolyBench-C is a C-language polyhedral benchmark suite made at the Ohio State University. Learn more via the OpenBenchmarking.org test page.
libgav1
Libgav1 is an AV1 decoder developed by Google for AV1 profile 0/1 compliance. Learn more via the OpenBenchmarking.org test page.
OSPray
Intel OSPray is a portable ray-tracing engine for high-performance, high-fidenlity scientific visualizations. OSPray builds off Intel's Embree and Intel SPMD Program Compiler (ISPC) components as part of the oneAPI rendering toolkit. Learn more via the OpenBenchmarking.org test page.
Numpy Benchmark
This is a test to obtain the general Numpy performance. Learn more via the OpenBenchmarking.org test page.
Bork File Encrypter
Bork is a small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage. This test measures the amount of time it takes to encrypt a sample file. Learn more via the OpenBenchmarking.org test page.
Intel Core i5-3320M
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x20
Python Notes: Python 2.7.16 + Python 3.7.3
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 24 October 2021 02:50 by user snopek.
Intel Ivybridge Mobile
Processor: Intel Core i5-3320M @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 2351BH6 (G1ETB8WW 2.78 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 240GB Western Digital WDS240G2G0A + 320GB 00AAKS-00B3A0, Graphics: Intel Ivybridge Mobile 2GB (1200MHz), Audio: Realtek ALC3202, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: Debian 10, Kernel: 4.19.0-18-amd64 (x86_64), Desktop: GNOME Shell 3.30.2, Display Server: X Server + Wayland, OpenGL: 4.2 Mesa 18.3.6, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1600x900
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x20
Java Notes: OpenJDK Runtime Environment (build 11.0.12+7-post-Debian-2deb10u1)
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 1 November 2021 00:27 by user snopek.