Intel Core i5-6400 testing with a Dell 0XJ8C4 (2.6.1 BIOS) and Intel HD 530 on CentOS Linux 7 via the Phoronix Test Suite.
Processor: Intel Core i5-6400 @ 3.30GHz (4 Cores), Motherboard: Dell 0XJ8C4 (2.6.1 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 2 x 4096 MB DDR4-2400MT/s IM44GU48N24-FFFHA0, Disk: 1000GB Seagate ST1000DM003-1ER1, Graphics: Intel HD 530 (950MHz), Audio: Realtek ALC3861, Network: Intel I219-V
OS: CentOS Linux 7, Kernel: 3.10.0-957.27.2.el7.x86_64 (x86_64), Display Driver: intel, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Disk Notes: DEADLINE / attr2,inode64,noquota,relatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xcc
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Vulnerable IBPB
This is a test of EEMBC CoreMark processor benchmark. Learn more via the OpenBenchmarking.org test page.
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
This is a test of 7-Zip using p7zip with its integrated benchmark feature or upstream 7-Zip for the Windows x64 build. Learn more via the OpenBenchmarking.org test page.
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test measures the RSA 4096-bit performance of OpenSSL. Learn more via the OpenBenchmarking.org test page.
This is a test of NetApp's PostMark benchmark designed to simulate small-file testing similar to the tasks endured by web and mail servers. This test profile will set PostMark to perform 25,000 transactions with 500 files simultaneously with the file sizes ranging between 5 and 512 kilobytes. Learn more via the OpenBenchmarking.org test page.
This is a test of C-Ray, a simple raytracer designed to test the floating-point CPU performance. This test is multi-threaded (16 threads per core), will shoot 8 rays per pixel for anti-aliasing, and will generate a 1600 x 1200 image. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i5-6400 @ 3.30GHz (4 Cores), Motherboard: Dell 0XJ8C4 (2.6.1 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 2 x 4096 MB DDR4-2400MT/s IM44GU48N24-FFFHA0, Disk: 1000GB Seagate ST1000DM003-1ER1, Graphics: Intel HD 530 (950MHz), Audio: Realtek ALC3861, Network: Intel I219-V
OS: CentOS Linux 7, Kernel: 3.10.0-957.27.2.el7.x86_64 (x86_64), Display Driver: intel, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Disk Notes: DEADLINE / attr2,inode64,noquota,relatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xcc
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Vulnerable IBPB
Testing initiated at 9 March 2021 21:12 by user .