stress
first
stress1
Processor: Intel Core i3-7100U @ 2.40GHz (2 Cores / 4 Threads), Motherboard: SKYBAY (5.12 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 8192MB, Disk: 120GB Patriot Burst, Graphics: Intel HD 620 3GB (1000MHz), Audio: Realtek ALC662 rev3, Monitor: 2475W, Network: Realtek RTL8111/8168/8411
OS: CentOS 8.0.1905, Kernel: 4.18.0-80.11.2.el8_0.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.3 + Wayland, Display Driver: modesetting 1.20.3, OpenGL: 4.5 Mesa 18.3.1, File-System: xfs, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xb4
Security Notes: SELinux + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Stressful Application Test
This is a pass/fail benchmark of stressapptest (Stressful Application Test) for verifying memory/RAM stability of the system. Learn more via the OpenBenchmarking.org test page.
stress1
Processor: Intel Core i3-7100U @ 2.40GHz (2 Cores / 4 Threads), Motherboard: SKYBAY (5.12 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 8192MB, Disk: 120GB Patriot Burst, Graphics: Intel HD 620 3GB (1000MHz), Audio: Realtek ALC662 rev3, Monitor: 2475W, Network: Realtek RTL8111/8168/8411
OS: CentOS 8.0.1905, Kernel: 4.18.0-80.11.2.el8_0.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.3 + Wayland, Display Driver: modesetting 1.20.3, OpenGL: 4.5 Mesa 18.3.1, File-System: xfs, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xb4
Security Notes: SELinux + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 23 December 2019 21:45 by user victor.