6.2.0-39-generic + Ubuntu 22.04 Tests

Various open-source benchmarks by the Phoronix Test Suite v10.8.4.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2312191-NE-62039GENE79
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
2023-12-19 13:03
December 19 2023
  8 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


6.2.0-39-generic + Ubuntu 22.04 TestsOpenBenchmarking.orgPhoronix Test SuiteIntel Core i3-3120M @ 2.50GHz (2 Cores / 4 Threads)TOSHIBA Portable PC (6.50 BIOS)Intel 3rd Gen Core DRAM4096MB320GB TOSHIBA MK3261GSIntel HD 4000 IVB GT2 2GB (1100MHz)Realtek ALC269VBQualcomm Atheros AR8162 + Realtek RTL8188CE 802.11b/g/nUbuntu 22.046.2.0-39-generic (x86_64)KDE Plasma 5.24.7X Server 1.21.1.44.2 Mesa 23.0.4-0ubuntu1~22.04.11.2.238ext41366x768ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDesktopDisplay ServerOpenGLVulkanFile-SystemScreen Resolution6.2.0-39-generic + Ubuntu 22.04 Tests PerformanceSystem Logs- Transparent Huge Pages: madvise- Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21 - Thermald 2.4.9 - gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected

6.2.0-39-generic + Ubuntu 22.04 Testsintel-mlc: Peak Injection Bandwidth - Stream-Triad Likeintel-mlc: Peak Injection Bandwidth - 1:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - 3:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - 2:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - All Reads2023-12-19 13:0311439.711153.411448.811310.711753.8OpenBenchmarking.org

Intel Memory Latency Checker

Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. If the download fails you may need to manually download the file from https://www.intel.com/content/www/us/en/developer/articles/tool/intelr-memory-latency-checker.html and place it in your PTS download cache. On some systems root privileges are needed to run the MLC tester. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - Stream-Triad Like2023-12-19 13:032K4K6K8K10KSE +/- 32.11, N = 311439.7

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - 1:1 Reads-Writes2023-12-19 13:032K4K6K8K10KSE +/- 33.26, N = 311153.4

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - 3:1 Reads-Writes2023-12-19 13:032K4K6K8K10KSE +/- 23.33, N = 311448.8

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - 2:1 Reads-Writes2023-12-19 13:032K4K6K8K10KSE +/- 27.06, N = 311310.7

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - All Reads2023-12-19 13:033K6K9K12K15KSE +/- 12.13, N = 311753.8