Intel Core i5-10210U testing with a Google Kindred (Google_Kindred.12672.413.0 BIOS) and Intel UHD CML GT2 8GB on Arch Linux via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xca
Python Notes: Python 3.10.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: eIBRS with unprivileged eBPF + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i5-10210U @ 4.20GHz (4 Cores / 8 Threads), Motherboard: Google Kindred (Google_Kindred.12672.413.0 BIOS), Chipset: Intel Comet Lake PCH-LP, Memory: 8GB, Disk: 1000GB Toshiba MKNSSDTS1TB-D8, Graphics: Intel UHD CML GT2 8GB (1100MHz), Audio: Intel Comet Lake PCH-LP cAVS, Network: Intel Comet Lake PCH-LP CNVi WiFi
OS: Arch Linux, Kernel: 5.10.133 (x86_64), Desktop: KDE Plasma 5.26.4, Display Server: X Server 1.21.1.6 + Wayland, OpenGL: 4.6 Mesa 22.3.1, Vulkan: 1.3.230, Compiler: GCC 12.2.0 + Clang 14.0.6, File-System: ext4, Screen Resolution: 2256x1504
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: eIBRS with unprivileged eBPF + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
This test times how long it takes to build the Linux kernel in a default configuration (defconfig) for the architecture being tested or alternatively an allmodconfig for building all possible kernel modules for the build. Learn more via the OpenBenchmarking.org test page.
This is a test to obtain the general Numpy performance. Learn more via the OpenBenchmarking.org test page.
Smallpt is a C++ global illumination renderer written in less than 100 lines of code. Global illumination is done via unbiased Monte Carlo path tracing and there is multi-threading support via the OpenMP library. Learn more via the OpenBenchmarking.org test page.
This test profile reports the total time of the different average timed test results from PyBench. PyBench reports average test times for different functions such as BuiltinFunctionCalls and NestedForLoops, with this total result providing a rough estimate as to Python's average performance on a given system. This test profile runs PyBench each time for 20 rounds. Learn more via the OpenBenchmarking.org test page.
This test times how long it takes to build the FFmpeg multimedia library. Learn more via the OpenBenchmarking.org test page.
Intel Core i5-10210U: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: Makefile:177: /tests/Makefile: No such file or directory
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xca
Python Notes: Python 3.10.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: eIBRS with unprivileged eBPF + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 6 January 2023 18:19 by user axel.
Processor: Intel Core i5-10210U @ 4.20GHz (4 Cores / 8 Threads), Motherboard: Google Kindred (Google_Kindred.12672.413.0 BIOS), Chipset: Intel Comet Lake PCH-LP, Memory: 8GB, Disk: 1000GB Toshiba MKNSSDTS1TB-D8, Graphics: Intel UHD CML GT2 8GB (1100MHz), Audio: Intel Comet Lake PCH-LP cAVS, Network: Intel Comet Lake PCH-LP CNVi WiFi
OS: Arch Linux, Kernel: 5.10.133 (x86_64), Desktop: KDE Plasma 5.26.4, Display Server: X Server 1.21.1.6 + Wayland, OpenGL: 4.6 Mesa 22.3.1, Vulkan: 1.3.230, Compiler: GCC 12.2.0 + Clang 14.0.6, File-System: ext4, Screen Resolution: 2256x1504
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: eIBRS with unprivileged eBPF + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 6 January 2023 18:30 by user axel.