Dell Latitude E5470 (1.22.3 BIOS) On Fedora 33

Various open-source benchmarks by the Phoronix Test Suite v9.0.1 (Asker).

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2010154-AS-DELLLATIT35
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
2020-10-15 04:34
October 15 2020
  6 Minutes


Dell Latitude E5470 (1.22.3 BIOS) On Fedora 33OpenBenchmarking.orgPhoronix Test SuiteIntel Core i7-6820HQ @ 3.60GHz (4 Cores / 8 Threads)Dell Latitude E5470 (1.22.3 BIOS)Intel Xeon E3-1200 v5/E3-150032768MB1000GB Samsung SSD 840Intel HD 530 3GB (1050MHz)Realtek ALC3235Intel I219-LM + Intel 8260Fedora 335.8.14-300.fc33.x86_64 (x86_64)GNOME Shell 3.38.1X Server + Wayland4.6 Mesa 20.2.0GCC 10.2.1 20201005btrfs1600x900ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDesktopDisplay ServerOpenGLCompilerFile-SystemScreen ResolutionDell Latitude E5470 (1.22.3 BIOS) On Fedora 33 BenchmarksSystem Logs- --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver - Scaling Governor: intel_pstate powersave- SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

Xsbench

XSBench is a mini-app representing a key computational kernel of the Monte Carlo neutronics application OpenMC. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgLookups/s, More Is BetterXsbench 2017-07-062020-10-15 04:34160K320K480K640K800KSE +/- 1961.95, N = 37466111. (CC) gcc options: -std=gnu99 -fopenmp -O3 -lm