testdelete

Intel Core i7-6600U testing with a LENOVO 20FRS0PP00 (N1FET44W 1.18 BIOS) and Intel HD 520 SKL GT2 3GB on Arch Linux via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2205110-EXUP-TESTDEL87&rdt.

testdeleteProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDesktopDisplay ServerOpenGLCompilerFile-SystemScreen ResolutionIntel HD 520 SKL GT201Intel Core i7-6600U @ 3.40GHz (2 Cores / 4 Threads)LENOVO 20FRS0PP00 (N1FET44W 1.18 BIOS)Intel Xeon E3-1200 v5/E3-150016GB512GB Toshiba THNSN5512GPU7Intel HD 520 SKL GT2 3GB (1050MHz)Conexant CX20753/4Intel I219-LM + Intel 8260Arch Linux5.17.5-arch1-1 (x86_64)KDE Plasma 5.24.5X Server 1.21.1.34.6 Mesa 22.0.3GCC 11.2.0 + Clang 13.0.1ext41920x1080OpenBenchmarking.orgKernel Details- Transparent Huge Pages: madviseProcessor Details- Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x9e Python Details- Python 3.10.4Security Details- itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable

testdeleteparaview: Wavelet Contour - 1280 x 1024Intel HD 520 SKL GT201OpenBenchmarking.org


Phoronix Test Suite v10.8.5