Various open-source benchmarks by the Phoronix Test Suite v9.8.0 (Nesodden).
Processor: Intel Core i7-4700HQ @ 3.40GHz (4 Cores / 8 Threads), Motherboard: ASUS G750JX v1.0 (G750JX.206 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 16GB, Disk: 1000GB Seagate ST1000LM024 HN-M + 256GB LITEONIT LCM-256, Graphics: ASUS NVIDIA GeForce GTX 770M 3GB, Audio: Realtek ALC3229, Network: Qualcomm Atheros QCA8171 + Broadcom BCM4352 802.11ac
OS: Arch rolling, Kernel: 5.9.8-arch1-1 (x86_64), Display Server: X Server 1.20.9, Display Driver: modesetting 1.20.9, Compiler: GCC 10.2.0 + Clang 11.0.0Target:, File-System: btrfs, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x8
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
This is a performance test of CacheBench, which is part of LLCbench. CacheBench is designed to test the memory and cache bandwidth performance Learn more via the OpenBenchmarking.org test page.
This is a test of t-test1 for basic memory allocator benchmarks. Note this test profile is currently very basic and the overall time does include the warmup time of the custom t-test1 compilation. Improvements welcome. Learn more via the OpenBenchmarking.org test page.
This is a basic/simple memory (RAM) bandwidth benchmark for memory copy operations. Learn more via the OpenBenchmarking.org test page.
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-4700HQ @ 3.40GHz (4 Cores / 8 Threads), Motherboard: ASUS G750JX v1.0 (G750JX.206 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 16GB, Disk: 1000GB Seagate ST1000LM024 HN-M + 256GB LITEONIT LCM-256, Graphics: ASUS NVIDIA GeForce GTX 770M 3GB, Audio: Realtek ALC3229, Network: Qualcomm Atheros QCA8171 + Broadcom BCM4352 802.11ac
OS: Arch rolling, Kernel: 5.9.8-arch1-1 (x86_64), Display Server: X Server 1.20.9, Display Driver: modesetting 1.20.9, Compiler: GCC 10.2.0 + Clang 11.0.0Target:, File-System: btrfs, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x8
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 13 November 2020 19:39 by user rathel.