skylake
Intel Core i7-8700 testing with a Dell 0654JC (1.2.22 BIOS) and Intel UHD 630 on Ubuntu 20.04 via the Phoronix Test Suite.
Intel Core i7-6700K
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Intel Core i7-6700K - Zotac NVIDIA GeForce GTX 1060
Processor: Intel Core i7-6700K @ 4.20GHz (4 Cores / 8 Threads), Motherboard: ASRock Z170M Pro4S (P7.40 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16384MB, Disk: 2 x 480GB Force MP510 + Samsung SSD 970 EVO Plus 500GB + 2 x 500GB Samsung SSD 850 + 500GB Samsung SSD 860 + 1000GB Portable SSD T5, Graphics: Zotac NVIDIA GeForce GTX 1060 6GB (1556/4006MHz), Audio: Realtek ALC892, Monitor: DELL U2717D, Network: Intel I219-V
OS: Ubuntu 18.04, Kernel: 5.0.0-27-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.4, Display Driver: NVIDIA 430.40, OpenGL: 4.6.0, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 5120x1440
AMD Ryzen 7 3700X
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
AMD Ryzen 7 3700X 8-Core
Processor: AMD Ryzen 7 3700X 8-Core @ 3.60GHz (8 Cores / 16 Threads), Motherboard: ASRock X570M Pro4 (P1.80 BIOS), Chipset: AMD Device 1480, Memory: 32768MB, Disk: Samsung SSD 970 EVO Plus 500GB + 2 x 480GB Force MP510 + 2 x 500GB Samsung SSD 850 + 500GB Samsung SSD 860, Graphics: Zotac NVIDIA GeForce GTX 1060 6GB (1556/4006MHz), Audio: NVIDIA GP106 HD Audio, Monitor: DELL U2717D, Network: Intel I211
OS: Ubuntu 18.04, Kernel: 5.0.0-27-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.4, Display Driver: NVIDIA 430.40, OpenGL: 4.6.0, Vulkan: 1.1.99, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 5120x1440
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Intel Core i7-8700 UHD630
Processor: Intel Core i7-8700 @ 4.60GHz (6 Cores / 12 Threads), Motherboard: Dell 0654JC (1.2.22 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 32GB, Disk: KXG60ZNV512G NVMe TOSHIBA 512GB + 2000GB Samsung SSD 860, Graphics: Intel UHD 630 (1200MHz), Audio: Realtek ALC3234, Monitor: DELL U2715H + DELL U2719DC, Network: Intel I219-V + Intel-AC 9560
OS: Ubuntu 20.04, Kernel: 5.4.0-42-generic (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.0.8, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 4000x2560
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
x264
This is a simple test of the x264 encoder run on the CPU (OpenCL support disabled) with a sample video file. Learn more via the OpenBenchmarking.org test page.
OpenSSL
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test measures the RSA 4096-bit performance of OpenSSL. Learn more via the OpenBenchmarking.org test page.
GraphicsMagick
This is a test of GraphicsMagick with its OpenMP implementation that performs various imaging tests to stress the system's CPU. Learn more via the OpenBenchmarking.org test page.
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
Git
This test measures the time needed to carry out some sample Git operations on an example, static repository that happens to be a copy of the GNOME GTK tool-kit repository. Learn more via the OpenBenchmarking.org test page.
Intel Core i7-6700K
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Testing initiated at 8 September 2019 11:08 by user gregor.
Intel Core i7-6700K - Zotac NVIDIA GeForce GTX 1060
Processor: Intel Core i7-6700K @ 4.20GHz (4 Cores / 8 Threads), Motherboard: ASRock Z170M Pro4S (P7.40 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16384MB, Disk: 2 x 480GB Force MP510 + Samsung SSD 970 EVO Plus 500GB + 2 x 500GB Samsung SSD 850 + 500GB Samsung SSD 860 + 1000GB Portable SSD T5, Graphics: Zotac NVIDIA GeForce GTX 1060 6GB (1556/4006MHz), Audio: Realtek ALC892, Monitor: DELL U2717D, Network: Intel I219-V
OS: Ubuntu 18.04, Kernel: 5.0.0-27-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.4, Display Driver: NVIDIA 430.40, OpenGL: 4.6.0, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 5120x1440
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Testing initiated at 8 September 2019 11:35 by user gregor.
AMD Ryzen 7 3700X
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Testing initiated at 15 September 2019 00:20 by user gregor.
AMD Ryzen 7 3700X 8-Core
Processor: AMD Ryzen 7 3700X 8-Core @ 3.60GHz (8 Cores / 16 Threads), Motherboard: ASRock X570M Pro4 (P1.80 BIOS), Chipset: AMD Device 1480, Memory: 32768MB, Disk: Samsung SSD 970 EVO Plus 500GB + 2 x 480GB Force MP510 + 2 x 500GB Samsung SSD 850 + 500GB Samsung SSD 860, Graphics: Zotac NVIDIA GeForce GTX 1060 6GB (1556/4006MHz), Audio: NVIDIA GP106 HD Audio, Monitor: DELL U2717D, Network: Intel I211
OS: Ubuntu 18.04, Kernel: 5.0.0-27-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.4, Display Driver: NVIDIA 430.40, OpenGL: 4.6.0, Vulkan: 1.1.99, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 5120x1440
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Testing initiated at 15 September 2019 00:32 by user gregor.
Intel Core i7-8700 UHD630
Processor: Intel Core i7-8700 @ 4.60GHz (6 Cores / 12 Threads), Motherboard: Dell 0654JC (1.2.22 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 32GB, Disk: KXG60ZNV512G NVMe TOSHIBA 512GB + 2000GB Samsung SSD 860, Graphics: Intel UHD 630 (1200MHz), Audio: Realtek ALC3234, Monitor: DELL U2715H + DELL U2719DC, Network: Intel I219-V + Intel-AC 9560
OS: Ubuntu 20.04, Kernel: 5.4.0-42-generic (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.0.8, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 4000x2560
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 31 August 2020 09:47 by user otoomet.