Ubuntu 16.04 Benchmarks
Various open-source benchmarks by the Phoronix Test Suite v10.2.0 (Harstad).
Intel Core 2 Duo E7300
Processor: Intel Core 2 Duo E7300 (2 Cores), Motherboard: Dell 0TW904 (A03 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH7, Memory: 4096MB, Disk: 250GB Western Digital WD2500AAJS-7, Graphics: Intel 82G33/G31 IGP, Audio: Analog Devices AD1984, Monitor: LG FULL HD, Network: Broadcom NetLink BCM5787 PCI
OS: Ubuntu 16.04, Kernel: 4.15.0-132-generic (x86_64), Desktop: LXDE 0.8.2, Display Server: X Server 1.19.6, Display Driver: intel 2.99.917, Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1600x900
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
OSPray
Intel OSPray is a portable ray-tracing engine for high-performance, high-fidenlity scientific visualizations. OSPray builds off Intel's Embree and Intel SPMD Program Compiler (ISPC) components as part of the oneAPI rendering toolkit. Learn more via the OpenBenchmarking.org test page.
Intel Core 2 Duo E7300
Processor: Intel Core 2 Duo E7300 (2 Cores), Motherboard: Dell 0TW904 (A03 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH7, Memory: 4096MB, Disk: 250GB Western Digital WD2500AAJS-7, Graphics: Intel 82G33/G31 IGP, Audio: Analog Devices AD1984, Monitor: LG FULL HD, Network: Broadcom NetLink BCM5787 PCI
OS: Ubuntu 16.04, Kernel: 4.15.0-132-generic (x86_64), Desktop: LXDE 0.8.2, Display Server: X Server 1.19.6, Display Driver: intel 2.99.917, Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1600x900
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 January 2021 11:34 by user administrator.