6.2.0-39-generic + Ubuntu 22.04 Tests

Various open-source benchmarks by the Phoronix Test Suite v10.8.4.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2312192-NE-62039GENE52
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
2023-12-19 12:58
December 19 2023
  8 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


6.2.0-39-generic + Ubuntu 22.04 TestsOpenBenchmarking.orgPhoronix Test SuiteIntel Core i3-3120M @ 2.50GHz (2 Cores / 4 Threads)TOSHIBA Portable PC (6.50 BIOS)Intel 3rd Gen Core DRAM4096MB320GB TOSHIBA MK3261GSIntel HD 4000 IVB GT2 2GB (1100MHz)Realtek ALC269VBQualcomm Atheros AR8162 + Realtek RTL8188CE 802.11b/g/nUbuntu 22.046.2.0-39-generic (x86_64)KDE Plasma 5.24.7X Server 1.21.1.44.2 Mesa 23.0.4-0ubuntu1~22.04.11.2.238ext41366x768ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDesktopDisplay ServerOpenGLVulkanFile-SystemScreen Resolution6.2.0-39-generic + Ubuntu 22.04 Tests PerformanceSystem Logs- Transparent Huge Pages: madvise- Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21 - Thermald 2.4.9 - gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected

6.2.0-39-generic + Ubuntu 22.04 Testsintel-mlc: Peak Injection Bandwidth - Stream-Triad Likeintel-mlc: Peak Injection Bandwidth - 1:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - 2:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - 3:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - All Reads2023-12-19 12:5811394.911025.411220.211389.811667.1OpenBenchmarking.org

Intel Memory Latency Checker

Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. If the download fails you may need to manually download the file from https://www.intel.com/content/www/us/en/developer/articles/tool/intelr-memory-latency-checker.html and place it in your PTS download cache. On some systems root privileges are needed to run the MLC tester. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - Stream-Triad Like2023-12-19 12:582K4K6K8K10KSE +/- 20.78, N = 311394.9

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - 1:1 Reads-Writes2023-12-19 12:582K4K6K8K10KSE +/- 43.43, N = 311025.4

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - 2:1 Reads-Writes2023-12-19 12:582K4K6K8K10KSE +/- 16.46, N = 311220.2

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - 3:1 Reads-Writes2023-12-19 12:582K4K6K8K10KSE +/- 34.22, N = 311389.8

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency Checker 3.10Test: Peak Injection Bandwidth - All Reads2023-12-19 12:582K4K6K8K10KSE +/- 57.30, N = 311667.1