test
None
Intel Core i3-7100U - Intel HD 620 3GB - Dell 0RW42M
Processor: Intel Core i3-7100U @ 2.40GHz (2 Cores / 4 Threads), Motherboard: Dell 0RW42M (1.21.1 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 20480MB, Disk: 240GB KINGSTON SH103S3, Graphics: Intel HD 620 3GB (1000MHz), Audio: Realtek ALC3253, Monitor: SAMSUNG, Network: Qualcomm Atheros QCA6174 802.11ac
OS: Antergos rolling, Kernel: 5.1.5-arch1-2-ARCH (x86_64), Desktop: GNOME Shell 3.32.2, Display Server: X Server 1.19.5, Display Driver: modesetting 1.19.5, OpenGL: 4.5 Mesa 19.0.5, Compiler: GCC 8.3.0 + Clang 8.0.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Sysbench
This is a benchmark of Sysbench with CPU and memory sub-tests. Learn more via the OpenBenchmarking.org test page.
Intel Core i3-7100U - Intel HD 620 3GB - Dell 0RW42M
Processor: Intel Core i3-7100U @ 2.40GHz (2 Cores / 4 Threads), Motherboard: Dell 0RW42M (1.21.1 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 20480MB, Disk: 240GB KINGSTON SH103S3, Graphics: Intel HD 620 3GB (1000MHz), Audio: Realtek ALC3253, Monitor: SAMSUNG, Network: Qualcomm Atheros QCA6174 802.11ac
OS: Antergos rolling, Kernel: 5.1.5-arch1-2-ARCH (x86_64), Desktop: GNOME Shell 3.32.2, Display Server: X Server 1.19.5, Display Driver: modesetting 1.19.5, OpenGL: 4.5 Mesa 19.0.5, Compiler: GCC 8.3.0 + Clang 8.0.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 1 June 2019 18:45 by user wozgeass.