Intel Core i7-6600U testing with a LENOVO 20FRS0PP00 (N1FET44W 1.18 BIOS) and Intel HD 520 SKL GT2 3GB on Arch Linux via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x9e
Python Notes: Python 3.10.4
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Processor: Intel Core i7-6600U @ 3.40GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20FRS0PP00 (N1FET44W 1.18 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: 512GB Toshiba THNSN5512GPU7, Graphics: Intel HD 520 SKL GT2 3GB (1050MHz), Audio: Conexant CX20753/4, Network: Intel I219-LM + Intel 8260
OS: Arch Linux, Kernel: 5.17.5-arch1-1 (x86_64), Desktop: KDE Plasma 5.24.5, Display Server: X Server 1.21.1.3, OpenGL: 4.6 Mesa 22.0.3, Compiler: GCC 11.2.0 + Clang 13.0.1, File-System: ext4, Screen Resolution: 1920x1080
This test runs ParaView benchmarks: an open-source data analytics and visualization application. Paraview describes itself as "an open-source, multi-platform data analysis and visualization application. ParaView users can quickly build visualizations to analyze their data using qualitative and quantitative techniques." Learn more via the OpenBenchmarking.org test page.
Test: Many Spheres - Resolution: 800 x 600
Intel HD 520 SKL GT2: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ParaView-5.9.0-MPI-Linux-Python3.8-64bit/bin/pvpython-real: error while loading shared libraries: libcrypt.so.1: cannot open shared object file: No such file or directory
Test: Many Spheres - Resolution: 1920 x 1080
01: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ParaView-5.9.0-MPI-Linux-Python3.8-64bit/bin/pvpython-real: error while loading shared libraries: libcrypt.so.1: cannot open shared object file: No such file or directory
Test: Wavelet Volume - Resolution: 1920 x 1080
01: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ParaView-5.9.0-MPI-Linux-Python3.8-64bit/bin/pvpython-real: error while loading shared libraries: libcrypt.so.1: cannot open shared object file: No such file or directory
Test: Wavelet Contour - Resolution: 1920 x 1080
01: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ParaView-5.9.0-MPI-Linux-Python3.8-64bit/bin/pvpython-real: error while loading shared libraries: libcrypt.so.1: cannot open shared object file: No such file or directory
Test: Many Spheres - Resolution: 1280 x 1024
01: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ParaView-5.9.0-MPI-Linux-Python3.8-64bit/bin/pvpython-real: error while loading shared libraries: libcrypt.so.1: cannot open shared object file: No such file or directory
Test: Wavelet Volume - Resolution: 1280 x 1024
01: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ParaView-5.9.0-MPI-Linux-Python3.8-64bit/bin/pvpython-real: error while loading shared libraries: libcrypt.so.1: cannot open shared object file: No such file or directory
Test: Wavelet Contour - Resolution: 1280 x 1024
01: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ParaView-5.9.0-MPI-Linux-Python3.8-64bit/bin/pvpython-real: error while loading shared libraries: libcrypt.so.1: cannot open shared object file: No such file or directory
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x9e
Python Notes: Python 3.10.4
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 11 May 2022 21:17 by user exup.
Processor: Intel Core i7-6600U @ 3.40GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20FRS0PP00 (N1FET44W 1.18 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: 512GB Toshiba THNSN5512GPU7, Graphics: Intel HD 520 SKL GT2 3GB (1050MHz), Audio: Conexant CX20753/4, Network: Intel I219-LM + Intel 8260
OS: Arch Linux, Kernel: 5.17.5-arch1-1 (x86_64), Desktop: KDE Plasma 5.24.5, Display Server: X Server 1.21.1.3, OpenGL: 4.6 Mesa 22.0.3, Compiler: GCC 11.2.0 + Clang 13.0.1, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x9e
Python Notes: Python 3.10.4
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 11 May 2022 21:19 by user exup.