Dell Latitude E5470 (1.22.3 BIOS) On Fedora 33
Various open-source benchmarks by the Phoronix Test Suite v9.0.1 (Asker).
Intel Core i7-6820HQ
Processor: Intel Core i7-6820HQ @ 3.60GHz (4 Cores / 8 Threads), Motherboard: Dell Latitude E5470 (1.22.3 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 32768MB, Disk: 1000GB Samsung SSD 840, Graphics: Intel HD 530 3GB (1050MHz), Audio: Realtek ALC3235, Network: Intel I219-LM + Intel 8260
OS: Fedora 33, Kernel: 5.8.11-300.fc33.x86_64 (x86_64), Desktop: GNOME Shell 3.38.1, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 20.2.0, Compiler: GCC 10.2.1 20200826, File-System: btrfs, Screen Resolution: 1600x900
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
LZMA Compression
This test measures the time needed to compress a file using LZMA compression. Learn more via the OpenBenchmarking.org test page.
Timed ImageMagick Compilation
This test times how long it takes to build ImageMagick. Learn more via the OpenBenchmarking.org test page.
Zstd Compression
This test measures the time needed to compress a sample file (an Ubuntu ISO) using Zstd compression. Learn more via the OpenBenchmarking.org test page.
asmFish
This is a test of asmFish, an advanced chess benchmark written in Assembly. Learn more via the OpenBenchmarking.org test page.
Tungsten Renderer
Tungsten is a C++ physically based renderer that makes use of Intel's Embree ray tracing library. Learn more via the OpenBenchmarking.org test page.
System Libxml2 Parsing
This test measures the time to parse a random XML file with libxml2 via xmllint using the streaming API. Learn more via the OpenBenchmarking.org test page.
Intel Core i7-6820HQ
Processor: Intel Core i7-6820HQ @ 3.60GHz (4 Cores / 8 Threads), Motherboard: Dell Latitude E5470 (1.22.3 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 32768MB, Disk: 1000GB Samsung SSD 840, Graphics: Intel HD 530 3GB (1050MHz), Audio: Realtek ALC3235, Network: Intel I219-LM + Intel 8260
OS: Fedora 33, Kernel: 5.8.11-300.fc33.x86_64 (x86_64), Desktop: GNOME Shell 3.38.1, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 20.2.0, Compiler: GCC 10.2.1 20200826, File-System: btrfs, Screen Resolution: 1600x900
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 11 October 2020 21:31 by user skoll.