Various open-source benchmarks by the Phoronix Test Suite v9.4.0m1 (Vestby).
Processor: Intel Core i7-9700K @ 5.20GHz (8 Cores), Motherboard: Gigabyte Z390 AORUS MASTER-CF (F10 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16GB, Disk: 2000GB Seagate ST2000DM008-2FR1 + 500GB Samsung SSD 850 + 256GB ADATA SX900 + 31GB Ultra USB 3.0, Graphics: NVIDIA GeForce GTX 1080 Ti 11GB (1480/5508MHz), Audio: NVIDIA GP102 HDMI Audio, Monitor: DELL P1130, Network: Aquantia AQC107 NBase-T/IEEE
OS: ManjaroLinux 19.0-pre2, Kernel: 5.4.12-1-MANJARO (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.7, Display Driver: NVIDIA 440.44, OpenGL: 4.6.0, Compiler: GCC 9.2.0 + Clang 9.0.1 + LLVM 9.0.1 + ICC + CUDA 10.1, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xca
OpenCL Notes: GPU Compute Cores: 3584
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Vulnerable; SMT disabled + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
OS: ManjaroLinux 19.0-pre2, Kernel: 5.4.12-xanmod7-1-xanmod (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.7, Display Driver: NVIDIA 440.44, OpenGL: 4.6.0, Compiler: GCC 9.2.0 + Clang 9.0.1 + LLVM 9.0.1 + ICC + CUDA 10.1, File-System: ext4, Screen Resolution: 1280x1024
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: BFQ / discard,noatime,rw
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Vulnerable; SMT disabled + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
This is a pass/fail benchmark of stressapptest (Stressful Application Test) for verifying memory/RAM stability of the system. Learn more via the OpenBenchmarking.org test page.
This is a performance test of CacheBench, which is part of LLCbench. CacheBench is designed to test the memory and cache bandwidth performance Learn more via the OpenBenchmarking.org test page.
This test runs the ANSI C version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This test is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
This is a test of twmperf/mcperf with memcached. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
This is a test of core-latency, which measures the latency between all core combinations on the system processor(s). Reported is the average latency. Learn more via the OpenBenchmarking.org test page.
This is a simple benchmark of SQLite. At present this test profile just measures the time to perform a pre-defined number of insertions on an indexed database. Learn more via the OpenBenchmarking.org test page.
This test measures the time needed to compress a sample file (an Ubuntu file-system image) using XZ compression. Learn more via the OpenBenchmarking.org test page.
A simple C++ program that calculates Pi to 8,765,4321 digits using the Leibniz formula. This test can be used for showcasing how to write a basic test profile. Learn more via the OpenBenchmarking.org test page.
This is a wrapper around the phoronix-test-suite debug-self-test sub-command for testing hot Phoronix Test Suite code paths and if wanting to compare different PHP implementations. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-9700K @ 5.20GHz (8 Cores), Motherboard: Gigabyte Z390 AORUS MASTER-CF (F10 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16GB, Disk: 2000GB Seagate ST2000DM008-2FR1 + 500GB Samsung SSD 850 + 256GB ADATA SX900 + 31GB Ultra USB 3.0, Graphics: NVIDIA GeForce GTX 1080 Ti 11GB (1480/5508MHz), Audio: NVIDIA GP102 HDMI Audio, Monitor: DELL P1130, Network: Aquantia AQC107 NBase-T/IEEE
OS: ManjaroLinux 19.0-pre2, Kernel: 5.4.12-1-MANJARO (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.7, Display Driver: NVIDIA 440.44, OpenGL: 4.6.0, Compiler: GCC 9.2.0 + Clang 9.0.1 + LLVM 9.0.1 + ICC + CUDA 10.1, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xca
OpenCL Notes: GPU Compute Cores: 3584
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Vulnerable; SMT disabled + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 17 January 2020 12:57 by user matt.
Processor: Intel Core i7-9700K @ 5.20GHz (8 Cores), Motherboard: Gigabyte Z390 AORUS MASTER-CF (F10 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16GB, Disk: 2000GB Seagate ST2000DM008-2FR1 + 500GB Samsung SSD 850 + 256GB ADATA SX900 + 31GB Ultra USB 3.0, Graphics: NVIDIA GeForce GTX 1080 Ti 11GB (1480/5508MHz), Audio: NVIDIA GP102 HDMI Audio, Monitor: DELL P1130, Network: Aquantia AQC107 NBase-T/IEEE
OS: ManjaroLinux 19.0-pre2, Kernel: 5.4.12-xanmod7-1-xanmod (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.7, Display Driver: NVIDIA 440.44, OpenGL: 4.6.0, Compiler: GCC 9.2.0 + Clang 9.0.1 + LLVM 9.0.1 + ICC + CUDA 10.1, File-System: ext4, Screen Resolution: 1280x1024
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: BFQ / discard,noatime,rw
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Vulnerable; SMT disabled + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 21 January 2020 02:38 by user matt.