Various open-source benchmarks by the Phoronix Test Suite v9.8.0 (Nesodden).
Processor: Intel Core i7-4700HQ @ 3.40GHz (4 Cores / 8 Threads), Motherboard: ASUS G750JX v1.0 (G750JX.206 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 16GB, Disk: 1000GB Seagate ST1000LM024 HN-M + 256GB LITEONIT LCM-256, Graphics: ASUS NVIDIA GeForce GTX 770M 3GB, Audio: Realtek ALC3229, Network: Qualcomm Atheros QCA8171 + Broadcom BCM4352 802.11ac
OS: Arch rolling, Kernel: 5.9.6-arch1-1 (x86_64), Display Server: X Server 1.20.9, Display Driver: modesetting 1.20.9, Compiler: GCC 10.2.0 + Clang 11.0.0Target:, File-System: btrfs, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x8
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
A simple, compressed, fast and persistent data store library for C. Learn more via the OpenBenchmarking.org test page.
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using RAR/WinRAR compression. Learn more via the OpenBenchmarking.org test page.
This is a test of SuperTuxKart, an open-source racing game. The engine, Antarctica, is a highly modified version of Irrlicht and uses OpenGL 3.1+. Bullet is used for physics. Sound is provided by OpenAL. Learn more via the OpenBenchmarking.org test page.
This test times how long it takes to build the Linux kernel in a default configuration. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-4700HQ @ 3.40GHz (4 Cores / 8 Threads), Motherboard: ASUS G750JX v1.0 (G750JX.206 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 16GB, Disk: 1000GB Seagate ST1000LM024 HN-M + 256GB LITEONIT LCM-256, Graphics: ASUS NVIDIA GeForce GTX 770M 3GB, Audio: Realtek ALC3229, Network: Qualcomm Atheros QCA8171 + Broadcom BCM4352 802.11ac
OS: Arch rolling, Kernel: 5.9.6-arch1-1 (x86_64), Display Server: X Server 1.20.9, Display Driver: modesetting 1.20.9, Compiler: GCC 10.2.0 + Clang 11.0.0Target:, File-System: btrfs, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x8
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 12 November 2020 20:30 by user rathel.