Intel Core i5-6300U testing with a Dell 0R3VX4 (1.21.4 BIOS) and Intel Skylake GT2 [HD 520] on Arch Linux via the Phoronix Test Suite.
Processor: Intel Core i5-6300U @ 3.00GHz (2 Cores / 4 Threads), Motherboard: Dell 0R3VX4 (1.21.4 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16384MB, Disk: 256GB SK hynix SC300 M, Graphics: Intel Skylake GT2 [HD 520] (1000MHz), Audio: Realtek ALC3235, Monitor: LG ULTRAWIDE, Network: Intel I219-LM + Intel 8260
OS: Arch Linux, Kernel: 5.2.17.a-1-hardened (x86_64), Desktop: GNOME Shell 3.34.0, Display Server: X Server + Wayland, Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 2560x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Processor: Intel Core i5-6300U @ 3.00GHz (2 Cores / 4 Threads), Motherboard: Dell 0R3VX4 (1.21.4 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16384MB, Disk: 256GB SK hynix SC300 M, Graphics: Intel Skylake GT2 [HD 520] (1000MHz), Audio: Realtek ALC3235, Network: Intel I219-LM + Intel 8260
OS: Arch Linux, Kernel: 5.2.17.a-1-hardened (x86_64), Desktop: GNOME Shell 3.34.0, Display Server: X Server + Wayland, Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: MQ-DEADLINE / relatime,rw
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Fio is an advanced disk benchmark that depends upon the kernel's AIO access library. Learn more via the OpenBenchmarking.org test page.
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
This is a test of ab, which is the Apache benchmark program. This test profile measures how many requests per second a given system can sustain when carrying out 1,000,000 requests with 100 requests being carried out concurrently. Learn more via the OpenBenchmarking.org test page.
LAME is an MP3 encoder licensed under the LGPL. This test measures the time required to encode a WAV file to MP3 format. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i5-6300U @ 3.00GHz (2 Cores / 4 Threads), Motherboard: Dell 0R3VX4 (1.21.4 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16384MB, Disk: 256GB SK hynix SC300 M, Graphics: Intel Skylake GT2 [HD 520] (1000MHz), Audio: Realtek ALC3235, Monitor: LG ULTRAWIDE, Network: Intel I219-LM + Intel 8260
OS: Arch Linux, Kernel: 5.2.17.a-1-hardened (x86_64), Desktop: GNOME Shell 3.34.0, Display Server: X Server + Wayland, Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 2560x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 27 September 2019 10:58 by user sebastiaan.
Processor: Intel Core i5-6300U @ 3.00GHz (2 Cores / 4 Threads), Motherboard: Dell 0R3VX4 (1.21.4 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16384MB, Disk: 256GB SK hynix SC300 M, Graphics: Intel Skylake GT2 [HD 520] (1000MHz), Audio: Realtek ALC3235, Network: Intel I219-LM + Intel 8260
OS: Arch Linux, Kernel: 5.2.17.a-1-hardened (x86_64), Desktop: GNOME Shell 3.34.0, Display Server: X Server + Wayland, Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: MQ-DEADLINE / relatime,rw
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 29 September 2019 15:23 by user sebastiaan.