cpu-test.results
Intel Core i7-7700K testing with a Gigabyte B150N-GSM-CF (F23c BIOS) and Intel HD 630 on Fedora 33 via the Phoronix Test Suite.
CPU-test
Processor: Intel Core i7-7700K @ 4.50GHz (4 Cores / 8 Threads), Motherboard: Gigabyte B150N-GSM-CF (F23c BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 32768MB, Disk: Samsung SSD 950 PRO 256GB + 3 x 500GB Samsung SSD 850, Graphics: Intel HD 630 (1150MHz), Audio: Realtek ALC887-VD, Network: Intel I219-V + Intel I211
OS: Fedora 33, Kernel: 5.11.7-200.fc33.x86_64 (x86_64), Compiler: GCC 10.2.1 20201125 + Clang 11.0.0, File-System: xfs, Screen Resolution: 3840x2160
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Sysbench
This is a benchmark of Sysbench with the built-in CPU and memory sub-tests. Sysbench is a scriptable multi-threaded benchmark tool based on LuaJIT. Learn more via the OpenBenchmarking.org test page.
CPU-test
Processor: Intel Core i7-7700K @ 4.50GHz (4 Cores / 8 Threads), Motherboard: Gigabyte B150N-GSM-CF (F23c BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 32768MB, Disk: Samsung SSD 950 PRO 256GB + 3 x 500GB Samsung SSD 850, Graphics: Intel HD 630 (1150MHz), Audio: Realtek ALC887-VD, Network: Intel I219-V + Intel I211
OS: Fedora 33, Kernel: 5.11.7-200.fc33.x86_64 (x86_64), Compiler: GCC 10.2.1 20201125 + Clang 11.0.0, File-System: xfs, Screen Resolution: 3840x2160
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 23 March 2021 20:25 by user mike.