mflab-browsermark
Intel Core i7-7700K testing with a ASUS STRIX Z270F GAMING (1009 BIOS) and ASUS Intel HD 630 on Gentoo 2.7 via the Phoronix Test Suite.
firefox-82
Processor: Intel Core i7-7700K @ 4.50GHz (4 Cores / 8 Threads), Motherboard: ASUS STRIX Z270F GAMING (1009 BIOS), Chipset: Intel Xeon E3-1200 v6/7th + Z270, Memory: 64GB, Disk: 1000GB Samsung SSD 970 EVO Plus 1TB + Samsung SSD 960 EVO 250GB + 2 x 4001GB HGST HDN724040AL, Graphics: ASUS Intel HD 630 (1150MHz), Audio: Intel 200 PCH HD Audio, Monitor: 2 x VG248 + L227W, Network: Intel I219-V
OS: Gentoo 2.7, Kernel: 5.9.8-gentoo (x86_64), Desktop: KDE Frameworks 5.76.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.1.10, Vulkan: 1.2.131, Compiler: GCC 9.3.0 + Clang 11.0.0Target: + LLVM 11.0.0 + CUDA 10.2, File-System: btrfs, Screen Resolution: 3600x1080
Environment Notes: RUSTFLAGS="-C linker=/usr/lib/llvm/10/bin/clang"
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x5e
Python Notes: Python 3.7.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable
firefox-83
OS: Gentoo 2.7, Kernel: 5.9.8-gentoo (x86_64), Desktop: Openbox 3.6.1, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.1.10, Vulkan: 1.2.131, Compiler: GCC 9.3.0 + Clang 11.0.0Target: + LLVM 11.0.0 + CUDA 10.2, File-System: btrfs, Screen Resolution: 3600x1080
firefox-83-clang
firefox-83-clang+lto
firefox-83-clang+lto+pgo
OS: Gentoo 2.7, Kernel: 5.9.8-gentoo (x86_64), Desktop: KDE Frameworks 5.76.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.1.10, Vulkan: 1.2.131, Compiler: GCC 9.3.0 + Clang 11.0.0Target: + LLVM 11.0.0 + CUDA 10.2, File-System: btrfs, Screen Resolution: 3600x1080
Selenium
This test profile uses the Selenium WebDriver for running various browser benchmarks in different available web browsers. Learn more via the OpenBenchmarking.org test page.
firefox-82
Processor: Intel Core i7-7700K @ 4.50GHz (4 Cores / 8 Threads), Motherboard: ASUS STRIX Z270F GAMING (1009 BIOS), Chipset: Intel Xeon E3-1200 v6/7th + Z270, Memory: 64GB, Disk: 1000GB Samsung SSD 970 EVO Plus 1TB + Samsung SSD 960 EVO 250GB + 2 x 4001GB HGST HDN724040AL, Graphics: ASUS Intel HD 630 (1150MHz), Audio: Intel 200 PCH HD Audio, Monitor: 2 x VG248 + L227W, Network: Intel I219-V
OS: Gentoo 2.7, Kernel: 5.9.8-gentoo (x86_64), Desktop: KDE Frameworks 5.76.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.1.10, Vulkan: 1.2.131, Compiler: GCC 9.3.0 + Clang 11.0.0Target: + LLVM 11.0.0 + CUDA 10.2, File-System: btrfs, Screen Resolution: 3600x1080
Environment Notes: RUSTFLAGS="-C linker=/usr/lib/llvm/10/bin/clang"
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x5e
Python Notes: Python 3.7.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable
Testing initiated at 17 November 2020 23:13 by user basiaf.
firefox-83
Processor: Intel Core i7-7700K @ 4.50GHz (4 Cores / 8 Threads), Motherboard: ASUS STRIX Z270F GAMING (1009 BIOS), Chipset: Intel Xeon E3-1200 v6/7th + Z270, Memory: 64GB, Disk: 1000GB Samsung SSD 970 EVO Plus 1TB + Samsung SSD 960 EVO 250GB + 2 x 4001GB HGST HDN724040AL, Graphics: ASUS Intel HD 630 (1150MHz), Audio: Intel 200 PCH HD Audio, Monitor: 2 x VG248 + L227W, Network: Intel I219-V
OS: Gentoo 2.7, Kernel: 5.9.8-gentoo (x86_64), Desktop: Openbox 3.6.1, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.1.10, Vulkan: 1.2.131, Compiler: GCC 9.3.0 + Clang 11.0.0Target: + LLVM 11.0.0 + CUDA 10.2, File-System: btrfs, Screen Resolution: 3600x1080
Environment Notes: RUSTFLAGS="-C linker=/usr/lib/llvm/10/bin/clang"
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x5e
Python Notes: Python 3.7.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable
Testing initiated at 24 November 2020 17:59 by user basiaf.
firefox-83-clang
Environment Notes: RUSTFLAGS="-C linker=/usr/lib/llvm/10/bin/clang"
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x5e
Python Notes: Python 3.7.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable
Testing initiated at 25 November 2020 16:41 by user basiaf.
firefox-83-clang+lto
Environment Notes: RUSTFLAGS="-C linker=/usr/lib/llvm/10/bin/clang"
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x5e
Python Notes: Python 3.7.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable
Testing initiated at 25 November 2020 21:14 by user basiaf.
firefox-83-clang+lto+pgo
Processor: Intel Core i7-7700K @ 4.50GHz (4 Cores / 8 Threads), Motherboard: ASUS STRIX Z270F GAMING (1009 BIOS), Chipset: Intel Xeon E3-1200 v6/7th + Z270, Memory: 64GB, Disk: 1000GB Samsung SSD 970 EVO Plus 1TB + Samsung SSD 960 EVO 250GB + 2 x 4001GB HGST HDN724040AL, Graphics: ASUS Intel HD 630 (1150MHz), Audio: Intel 200 PCH HD Audio, Monitor: 2 x VG248 + L227W, Network: Intel I219-V
OS: Gentoo 2.7, Kernel: 5.9.8-gentoo (x86_64), Desktop: KDE Frameworks 5.76.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.1.10, Vulkan: 1.2.131, Compiler: GCC 9.3.0 + Clang 11.0.0Target: + LLVM 11.0.0 + CUDA 10.2, File-System: btrfs, Screen Resolution: 3600x1080
Environment Notes: RUSTFLAGS="-C linker=/usr/lib/llvm/10/bin/clang"
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x5e
Python Notes: Python 3.7.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable
Testing initiated at 26 November 2020 19:11 by user basiaf.