cachebench-manjaro
Intel Core i7-3537U testing with a ASUS B400VC v1.0 (B400VC.210 BIOS) and ASUS Intel 3rd Gen Core on ManjaroLinux 21.3.7 via the Phoronix Test Suite.
Cache benchmark in Manjaro
Processor: Intel Core i7-3537U @ 3.10GHz (2 Cores / 4 Threads), Motherboard: ASUS B400VC v1.0 (B400VC.210 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 12GB, Disk: 1000GB Samsung SSD 860 + 128GB KINGSTON SMSM150 + 32GB USB Flash Disk, Graphics: ASUS Intel 3rd Gen Core (1200MHz), Audio: Realtek ALC269VB, Monitor: VS24A, Network: Intel 82579V + Intel Centrino Advanced-N 6235
OS: ManjaroLinux 21.3.7, Kernel: 5.15.60-1-MANJARO (x86_64), Desktop: Xfce 4.16, Display Server: X Server 1.21.1.4, Compiler: GCC 12.1.1 20220730 + Clang 14.0.6 + LLVM 14.0.6, File-System: overlayfs, Screen Resolution: 3520x1200
Kernel Notes: nouveau.modeset=1 i915.modeset=1 - Transparent Huge Pages: madvise
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x15
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
CacheBench
This is a performance test of CacheBench, which is part of LLCbench. CacheBench is designed to test the memory and cache bandwidth performance Learn more via the OpenBenchmarking.org test page.
Cache benchmark in Manjaro
Processor: Intel Core i7-3537U @ 3.10GHz (2 Cores / 4 Threads), Motherboard: ASUS B400VC v1.0 (B400VC.210 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 12GB, Disk: 1000GB Samsung SSD 860 + 128GB KINGSTON SMSM150 + 32GB USB Flash Disk, Graphics: ASUS Intel 3rd Gen Core (1200MHz), Audio: Realtek ALC269VB, Monitor: VS24A, Network: Intel 82579V + Intel Centrino Advanced-N 6235
OS: ManjaroLinux 21.3.7, Kernel: 5.15.60-1-MANJARO (x86_64), Desktop: Xfce 4.16, Display Server: X Server 1.21.1.4, Compiler: GCC 12.1.1 20220730 + Clang 14.0.6 + LLVM 14.0.6, File-System: overlayfs, Screen Resolution: 3520x1200
Kernel Notes: nouveau.modeset=1 i915.modeset=1 - Transparent Huge Pages: madvise
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x15
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 24 September 2022 12:57 by user xxxxpro.