Various open-source benchmarks by the Phoronix Test Suite v10.0.1 (Finnsnes).
Processor: Intel Core i7-4700HQ @ 3.40GHz (4 Cores / 8 Threads), Motherboard: ASUS G750JX v1.0 (G750JX.206 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 16GB, Disk: 1000GB Seagate ST1000LM024 HN-M + 256GB LITEONIT LCM-256, Graphics: ASUS NVIDIA GeForce GTX 770M 3GB, Audio: Realtek ALC3229, Network: Qualcomm Atheros QCA8171 + Broadcom BCM4352 802.11ac
OS: Arch rolling, Kernel: 5.9.10-arch1-1 (x86_64), Desktop: KDE Plasma 5.20.3, Display Server: X Server 1.20.9, Display Driver: NVIDIA 455.45.01, OpenGL: 4.6.0, Compiler: GCC 10.2.0 + Clang 11.0.0Target:, File-System: btrfs, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x8
Python Notes: Python 3.8.6
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
This is a benchmark of Sysbench with CPU and memory sub-tests. Learn more via the OpenBenchmarking.org test page.
This is a test of SuperTuxKart, an open-source racing game. The engine, Antarctica, is a highly modified version of Irrlicht and uses OpenGL 3.1+. Bullet is used for physics. Sound is provided by OpenAL. Learn more via the OpenBenchmarking.org test page.
This test profile uses the Selenium WebDriver for running various browser benchmarks in different available web browsers. Learn more via the OpenBenchmarking.org test page.
This test times how long it takes to convert several high-resolution RAW NEF image files to PPM image format using dcraw. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-4700HQ @ 3.40GHz (4 Cores / 8 Threads), Motherboard: ASUS G750JX v1.0 (G750JX.206 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 16GB, Disk: 1000GB Seagate ST1000LM024 HN-M + 256GB LITEONIT LCM-256, Graphics: ASUS NVIDIA GeForce GTX 770M 3GB, Audio: Realtek ALC3229, Network: Qualcomm Atheros QCA8171 + Broadcom BCM4352 802.11ac
OS: Arch rolling, Kernel: 5.9.10-arch1-1 (x86_64), Desktop: KDE Plasma 5.20.3, Display Server: X Server 1.20.9, Display Driver: NVIDIA 455.45.01, OpenGL: 4.6.0, Compiler: GCC 10.2.0 + Clang 11.0.0Target:, File-System: btrfs, Screen Resolution: 1920x1080
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x8
Python Notes: Python 3.8.6
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 26 November 2020 15:05 by user rathel.