test
1234
test
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-linux-gnu --disable-browser-plugin --disable-vtable-verify --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic -v
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x9a
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT disabled + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT disabled
ASUS Intel UHD 630 CFL GT2
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x9a
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT disabled + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT disabled
10.08
Processor: Intel Core i5-9600 @ 4.60GHz (6 Cores), Motherboard: ASUS PRIME B360M-C (2201 BIOS), Chipset: Intel Device a36f, Memory: 2 x 8192 MB DDR4-2133MHz Patriot, Disk: 250GB Samsung SSD 860 + 1000GB TOSHIBA HDWD110, Graphics: ASUS Intel UHD 630 CFL GT2 3GB (1150MHz), Audio: Realtek ALC887-VD, Monitor: Mi Monitor, Network: Intel Device 15bc
OS: AstraLinuxCE 2.12.45, Kernel: 5.10.0-1057-generic (x86_64), Display Server: X Server, OpenGL: 4.6 Mesa 20.1.7, Compiler: GCC 6.3.0 20170516, File-System: ext4, Screen Resolution: 3440x1440
OpenSSL
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test profile makes use of the built-in "openssl speed" benchmarking capabilities. Learn more via the OpenBenchmarking.org test page.
IndigoBench
This is a test of Indigo Renderer's IndigoBench benchmark. Learn more via the OpenBenchmarking.org test page.
Acceleration: OpenCL GPU - Scene: Supercar
test: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: ./indigo_benchmark: /lib/x86_64-linux-gnu/libc.so.6: version `GLIBC_2.25' not found (required by IndigoBenchmark_v4.4.15/lib/libQt5Core.so.5)
Metro: Last Light Redux
A Steam-based test of the Metro: Last Light Redux game. Learn more via the OpenBenchmarking.org test page.
Resolution: 1920 x 1080
ASUS Intel UHD 630 CFL GT2: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: metroll-redux: line 6: ./metro: No such file or directory
Blender
Blender is an open-source 3D creation and modeling software project. This test is of Blender's Cycles benchmark with various sample files. GPU computing via NVIDIA OptiX and NVIDIA CUDA is currently supported and HIP for AMD Radeon GPUs. Learn more via the OpenBenchmarking.org test page.
-b ../bmw27_gpu.blend -o output.test -x 1 -F JPEG -f 1 -- --cycles-device CPU
10.08: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: argument has no '.blend' file extension, not using as new file, exiting! blender-3.2.0-linux-x64/Blend
test
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-linux-gnu --disable-browser-plugin --disable-vtable-verify --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic -v
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x9a
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT disabled + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT disabled
Testing initiated at 11 August 2022 09:59 by user root.
ASUS Intel UHD 630 CFL GT2
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x9a
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT disabled + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT disabled
Testing initiated at 11 August 2022 12:24 by user root.
10.08
Processor: Intel Core i5-9600 @ 4.60GHz (6 Cores), Motherboard: ASUS PRIME B360M-C (2201 BIOS), Chipset: Intel Device a36f, Memory: 2 x 8192 MB DDR4-2133MHz Patriot, Disk: 250GB Samsung SSD 860 + 1000GB TOSHIBA HDWD110, Graphics: ASUS Intel UHD 630 CFL GT2 3GB (1150MHz), Audio: Realtek ALC887-VD, Monitor: Mi Monitor, Network: Intel Device 15bc
OS: AstraLinuxCE 2.12.45, Kernel: 5.10.0-1057-generic (x86_64), Display Server: X Server, OpenGL: 4.6 Mesa 20.1.7, Compiler: GCC 6.3.0 20170516, File-System: ext4, Screen Resolution: 3440x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x9a
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT disabled + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT disabled
Testing initiated at 11 August 2022 14:13 by user root.