Baseline
Intel Core i5-8350U testing with a Dell 0VYDFF (1.8.3 BIOS) and Intel UHD 620 3GB on Arch Linux via the Phoronix Test Suite.
Arch Linux Hardened Custom
Processor: Intel Core i5-8350U @ 3.60GHz (4 Cores / 8 Threads), Motherboard: Dell 0VYDFF (1.8.3 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 16384MB, Disk: PC401 NVMe SK hynix 256GB, Graphics: Intel UHD 620 3GB (1100MHz), Audio: Intel Sunrise Point-LP HD Audio, Monitor: 2 x PL2730Q, Network: Intel I219-LM + Intel 8265 / 8275
OS: Arch Linux, Kernel: 5.2.17.a-1-hardened (x86_64), Desktop: GNOME Shell 3.34.0, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 19.1.7, Vulkan: 1.1.102, Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: NONE / relatime,rw
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Flexible IO Tester
Fio is an advanced disk benchmark that depends upon the kernel's AIO access library. Learn more via the OpenBenchmarking.org test page.
RAMspeed SMP
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
John The Ripper
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
LAME MP3 Encoding
LAME is an MP3 encoder licensed under the LGPL. This test measures the time required to encode a WAV file to MP3 format. Learn more via the OpenBenchmarking.org test page.
Apache Benchmark
This is a test of ab, which is the Apache benchmark program. This test profile measures how many requests per second a given system can sustain when carrying out 1,000,000 requests with 100 requests being carried out concurrently. Learn more via the OpenBenchmarking.org test page.
Arch Linux Hardened Custom
Processor: Intel Core i5-8350U @ 3.60GHz (4 Cores / 8 Threads), Motherboard: Dell 0VYDFF (1.8.3 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 16384MB, Disk: PC401 NVMe SK hynix 256GB, Graphics: Intel UHD 620 3GB (1100MHz), Audio: Intel Sunrise Point-LP HD Audio, Monitor: 2 x PL2730Q, Network: Intel I219-LM + Intel 8265 / 8275
OS: Arch Linux, Kernel: 5.2.17.a-1-hardened (x86_64), Desktop: GNOME Shell 3.34.0, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 19.1.7, Vulkan: 1.1.102, Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: NONE / relatime,rw
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 29 September 2019 14:44 by user sebastiaan.