Intel Core i7-6700 + Intel HD 530 + ASUS Z170-A (3802 BIOS)
Various open-source benchmarks by the Phoronix Test Suite v9.0.1 (Asker).
Intel Core i7-6700
Processor: Intel Core i7-6700 @ 4.00GHz (4 Cores / 8 Threads), Motherboard: ASUS Z170-A (3802 BIOS), Chipset: Intel Skylake, Memory: 16384MB, Disk: 512GB INTEL SSDPEKNW512G8 + 240GB KINGSTON SA400S3, Graphics: Intel HD 530 (1150MHz), Audio: Realtek ALC892, Monitor: S24B300, Network: Intel I219-V + Realtek RTL8111/8168/8411
OS: Debian 10, Kernel: 4.19.0-5-amd64 (x86_64), Desktop: GNOME Shell 3.30.2, Display Server: X Server 1.20.4 + Wayland, Display Driver: modesetting 1.20.4, Compiler: GCC 8.3.0 + CUDA 9.2, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
asmFish
This is a test of asmFish, an advanced chess benchmark written in Assembly. Learn more via the OpenBenchmarking.org test page.
Intel Core i7-6700
Processor: Intel Core i7-6700 @ 4.00GHz (4 Cores / 8 Threads), Motherboard: ASUS Z170-A (3802 BIOS), Chipset: Intel Skylake, Memory: 16384MB, Disk: 512GB INTEL SSDPEKNW512G8 + 240GB KINGSTON SA400S3, Graphics: Intel HD 530 (1150MHz), Audio: Realtek ALC892, Monitor: S24B300, Network: Intel I219-V + Realtek RTL8111/8168/8411
OS: Debian 10, Kernel: 4.19.0-5-amd64 (x86_64), Desktop: GNOME Shell 3.30.2, Display Server: X Server 1.20.4 + Wayland, Display Driver: modesetting 1.20.4, Compiler: GCC 8.3.0 + CUDA 9.2, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 25 October 2019 16:19 by user brixel.