Dell 0RY007 (1.0.10 BIOS) On CentOS Linux 8
Various open-source benchmarks by the Phoronix Test Suite v10.0.1 (Finnsnes).
Intel Pentium Dual E2160
Processor: Intel Pentium Dual E2160 @ 1.80GHz (2 Cores), Motherboard: Dell 0RY007 (1.0.10 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9R, Memory: 3584MB, Disk: 320GB Seagate ST3320620AS, Graphics: NVIDIA GeForce 8600 GT 256MB, Audio: Realtek ALC888, Monitor: ASUS VS228, Network: Intel 82562V-2 10/100
OS: CentOS Linux 8, Kernel: 4.18.0-193.28.1.el8_2.x86_64 (x86_64), Desktop: GNOME Shell 3.32.2, Display Server: X Server, OpenGL: 3.3 Mesa 19.3.4 (LLVM 9.0.0 128 bits), Compiler: GCC 8.3.1 20191121, File-System: xfs, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0xa4
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
SciMark
This test runs the ANSI C version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This test is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
Himeno Benchmark
The Himeno benchmark is a linear solver of pressure Poisson using a point-Jacobi method. Learn more via the OpenBenchmarking.org test page.
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
Intel Pentium Dual E2160
Processor: Intel Pentium Dual E2160 @ 1.80GHz (2 Cores), Motherboard: Dell 0RY007 (1.0.10 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9R, Memory: 3584MB, Disk: 320GB Seagate ST3320620AS, Graphics: NVIDIA GeForce 8600 GT 256MB, Audio: Realtek ALC888, Monitor: ASUS VS228, Network: Intel 82562V-2 10/100
OS: CentOS Linux 8, Kernel: 4.18.0-193.28.1.el8_2.x86_64 (x86_64), Desktop: GNOME Shell 3.32.2, Display Server: X Server, OpenGL: 3.3 Mesa 19.3.4 (LLVM 9.0.0 128 bits), Compiler: GCC 8.3.1 20191121, File-System: xfs, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0xa4
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 November 2020 18:56 by user .