AMD Ryzen 7 3700X 8-Core testing with a ASRock X570M Pro4 (P1.80 BIOS) and Zotac NVIDIA GeForce GTX 1060 6GB on Ubuntu 18.04 via the Phoronix Test Suite.
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Processor: Intel Core i7-6700K @ 4.20GHz (4 Cores / 8 Threads), Motherboard: ASRock Z170M Pro4S (P7.40 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16384MB, Disk: 2 x 480GB Force MP510 + Samsung SSD 970 EVO Plus 500GB + 2 x 500GB Samsung SSD 850 + 500GB Samsung SSD 860 + 1000GB Portable SSD T5, Graphics: Zotac NVIDIA GeForce GTX 1060 6GB (1556/4006MHz), Audio: Realtek ALC892, Monitor: DELL U2717D, Network: Intel I219-V
OS: Ubuntu 18.04, Kernel: 5.0.0-27-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.4, Display Driver: NVIDIA 430.40, OpenGL: 4.6.0, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 5120x1440
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Processor: AMD Ryzen 7 3700X 8-Core @ 3.60GHz (8 Cores / 16 Threads), Motherboard: ASRock X570M Pro4 (P1.80 BIOS), Chipset: AMD Device 1480, Memory: 32768MB, Disk: Samsung SSD 970 EVO Plus 500GB + 2 x 480GB Force MP510 + 2 x 500GB Samsung SSD 850 + 500GB Samsung SSD 860, Graphics: Zotac NVIDIA GeForce GTX 1060 6GB (1556/4006MHz), Audio: NVIDIA GP106 HD Audio, Monitor: DELL U2717D, Network: Intel I211
OS: Ubuntu 18.04, Kernel: 5.0.0-27-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.4, Display Driver: NVIDIA 430.40, OpenGL: 4.6.0, Vulkan: 1.1.99, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 5120x1440
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
This is a simple test of the x264 encoder run on the CPU (OpenCL support disabled) with a sample video file. Learn more via the OpenBenchmarking.org test page.
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test measures the RSA 4096-bit performance of OpenSSL. Learn more via the OpenBenchmarking.org test page.
This is a test of GraphicsMagick with its OpenMP implementation that performs various imaging tests to stress the system's CPU. Learn more via the OpenBenchmarking.org test page.
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
This test measures the time needed to carry out some sample Git operations on an example, static repository that happens to be a copy of the GNOME GTK tool-kit repository. Learn more via the OpenBenchmarking.org test page.
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Testing initiated at 8 September 2019 11:08 by user gregor.
Processor: Intel Core i7-6700K @ 4.20GHz (4 Cores / 8 Threads), Motherboard: ASRock Z170M Pro4S (P7.40 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16384MB, Disk: 2 x 480GB Force MP510 + Samsung SSD 970 EVO Plus 500GB + 2 x 500GB Samsung SSD 850 + 500GB Samsung SSD 860 + 1000GB Portable SSD T5, Graphics: Zotac NVIDIA GeForce GTX 1060 6GB (1556/4006MHz), Audio: Realtek ALC892, Monitor: DELL U2717D, Network: Intel I219-V
OS: Ubuntu 18.04, Kernel: 5.0.0-27-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.4, Display Driver: NVIDIA 430.40, OpenGL: 4.6.0, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 5120x1440
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Testing initiated at 8 September 2019 11:35 by user gregor.
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Testing initiated at 15 September 2019 00:20 by user gregor.
Processor: AMD Ryzen 7 3700X 8-Core @ 3.60GHz (8 Cores / 16 Threads), Motherboard: ASRock X570M Pro4 (P1.80 BIOS), Chipset: AMD Device 1480, Memory: 32768MB, Disk: Samsung SSD 970 EVO Plus 500GB + 2 x 480GB Force MP510 + 2 x 500GB Samsung SSD 850 + 500GB Samsung SSD 860, Graphics: Zotac NVIDIA GeForce GTX 1060 6GB (1556/4006MHz), Audio: NVIDIA GP106 HD Audio, Monitor: DELL U2717D, Network: Intel I211
OS: Ubuntu 18.04, Kernel: 5.0.0-27-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.4, Display Driver: NVIDIA 430.40, OpenGL: 4.6.0, Vulkan: 1.1.99, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 5120x1440
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Testing initiated at 15 September 2019 00:32 by user gregor.